{"id":5420,"date":"2023-11-20T11:44:00","date_gmt":"2023-11-20T07:44:00","guid":{"rendered":"https:\/\/blog.volgablob.ru\/?p=5420"},"modified":"2023-11-20T12:42:25","modified_gmt":"2023-11-20T08:42:25","slug":"%f0%9f%9a%80-%d0%be%d0%b1%d0%bd%d0%be%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b5-%d0%bc%d0%be%d0%b4%d1%83%d0%bb%d1%8f-mitre-attck","status":"publish","type":"post","link":"https:\/\/blog.volgablob.ru\/?p=5420","title":{"rendered":"&#x1f680; \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043c\u043e\u0434\u0443\u043b\u044f MITRE ATT&amp;CK"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><h1>&#x1f680; \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043c\u043e\u0434\u0443\u043b\u044f MITRE ATT<font face=\"Arial\">&#038;<\/font>CK<\/h1>\n<div>31 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2023 \u0433\u043e\u0434\u0430 \u0431\u044b\u043b\u0430 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u0430 \u043d\u043e\u0432\u0430\u044f 14-\u044f \u0432\u0435\u0440\u0441\u0438\u044f MITRE ATT<font face=\"Arial\">&#038;<\/font>CK. \u041c\u044b \u0443\u0436\u0435 \u0432\u043d\u0435\u0434\u0440\u0438\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043d\u0430\u0448\u0443 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443 Smart Monitor. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0438 <a href=\"https:\/\/volgablob.ru\/ru\/sm\/ma\">\u043c\u043e\u0434\u0443\u043b\u044c MITRE ATT<font face=\"Arial\">&#038;<\/font>CK<\/a>. \u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0445\u043e\u0442\u0438\u043c \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0440\u0435\u043b\u0438\u0437\u0430.<\/p>\n<\/div>\n<p><video src=\"\/wp-content\/uploads\/2023\/11\/mitre-update-illustration.mp4\" poster=\"\"><\/video><\/p>\n<h3>\u0421\u043e\u0434\u0435\u0440\u0436\u0430\u043d\u0438\u0435<\/h3>\n<ul>\n<li>\n<p><a href=\"#techniques\">\u0422\u0435\u0445\u043d\u0438\u043a\u0438<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"#software\">\u041f\u041e<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"#groups\">\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"#campaigns\">\u0425\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438<\/a><\/p>\n<\/li>\n<\/ul>\n<h3>&#x2705; \u0412 14-\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Enterprise MITRE ATT<font face=\"Arial\">&#038;<\/font>CK \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043e 18 \u043d\u043e\u0432\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u043a \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0431\u043e\u043b\u0435\u0435 100 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0442\u0435\u0445\u043d\u0438\u043a<\/h3>\n<hr \/>\n<ul>\n<li>\n<h3>\u041d\u043e\u0432\u044b\u0435 \u0442\u0435\u0445\u043d\u0438\u043a\u0438<\/h3>\n<div>\n<ul>\n<li>Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access (v1.0)<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Account Manipulation: Additional Container Cluster Roles (v1.0)<\/li>\n<li>Content Injection (v1.0)<\/li>\n<li>Credentials from Password Stores: Cloud Secrets Management Stores (v1.0)<\/li>\n<li>Exfiltration Over Web Service: Exfiltration Over Webhook (v1.0)<\/li>\n<li>Financial Theft (v1.0)<\/li>\n<li>Hide Artifacts: Ignore Process Interrupts (v1.0)<\/li>\n<li>Impair Defenses: Disable or Modify Linux Audit System (v1.0)<\/li>\n<li>Impersonation (v1.0)<\/li>\n<li>Log Enumeration (v1.0)<\/li>\n<li>Masquerading: Break Process Trees (v1.0)<\/li>\n<li>Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations (v1.0)<\/li>\n<li>Obfuscated Files or Information: LNK Icon Smuggling (v1.0)<\/li>\n<li>Phishing: Spearphishing Voice (v1.0)<\/li>\n<li>Phishing for Information: Spearphishing Voice (v1.0)<\/li>\n<li>Power Settings (v1.0)<\/li>\n<li>Remote Services: Direct Cloud VM Connections (v1.0)<\/li>\n<li>System Network Configuration Discovery: Wi-Fi Discovery (v1.0)<\/li>\n<\/ul>\n<li>\n<h3>\u041a\u0440\u0443\u043f\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438<\/h3>\n<div>\n<ul>\n<li>Boot or Logon Autostart Execution: Registry Run Keys \/ Startup Folder (v1.2\u2192v2.0)<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Impair Defenses: Disable or Modify Cloud Logs (v1.3\u2192v2.0)<\/li>\n<li>\n<h3>\u041d\u0435\u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 <\/h3>\n<div>\n<ul>\n<li>Abuse Elevation Control Mechanism (v1.1\u2192v1.2)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Access Token Manipulation: Token Impersonation\/Theft (v1.1\u2192v1.2)\n<\/li>\n<li>Account Manipulation (v2.5\u2192v2.6)\n<\/li>\n<li>Additional Cloud Credentials (v2.5\u2192v2.6)\n<\/li>\n<li>Additional Cloud Roles (v2.2\u2192v2.3)\n<\/li>\n<li>Additional Email Delegate Permissions (v2.0\u2192v2.1)\n<\/li>\n<li>Device Registration (v1.1\u2192v1.2)\n<\/li>\n<li>SSH Authorized Keys (v1.2\u2192v1.3)\n<\/li>\n<li>Acquire Infrastructure (v1.2\u2192v1.3)\n<\/li>\n<li>Adversary-in-the-Middle (v2.2\u2192v2.3)\n<\/li>\n<li>Application Layer Protocol: File Transfer Protocols (v1.0\u2192v1.1)\n<\/li>\n<li>Application Layer Protocol: Web Protocols (v1.1\u2192v1.2)\n<\/li>\n<li>Archive Collected Data: Archive via Utility (v1.2\u2192v1.3)\n<\/li>\n<li>Boot or Logon Autostart Execution: Print Processors (v1.0\u2192v1.1)\n<\/li>\n<li>Boot or Logon Autostart Execution: Winlogon Helper DLL (v1.0\u2192v1.1)\n<\/li>\n<li>Boot or Logon Autostart Execution: XDG Autostart Entries (v1.0\u2192v1.1)\n<\/li>\n<li>Boot or Logon Initialization Scripts (v2.1\u2192v2.2)\n<\/li>\n<li>Brute Force: Credential Stuffing (v1.3\u2192v1.4)\n<\/li>\n<li>Brute Force: Password Guessing (v1.4\u2192v1.5)\n<\/li>\n<li>Brute Force: Password Spraying (v1.3\u2192v1.4)\n<\/li>\n<li>Cloud Service Dashboard (v1.1\u2192v1.2)\n<\/li>\n<li>Command and Scripting Interpreter: Windows Command Shell (v1.2\u2192v1.3)\n<\/li>\n<li>Compromise Client Software Binary (v1.0\u2192v1.1)\n<\/li>\n<li>Compromise Infrastructure (v1.3\u2192v1.4)\n<\/li>\n<li>Create Account (v2.3\u2192v2.4)\n<\/li>\n<li>Cloud Account (v1.3\u2192v1.4)\n<\/li>\n<li>Domain Account (v1.0\u2192v1.1)\n<\/li>\n<li>Local Account (v1.2\u2192v1.3)\n<\/li>\n<li>Create or Modify System Process: Systemd Service (v1.3\u2192v1.4)\n<\/li>\n<li>Create or Modify System Process: Windows Service (v1.3\u2192v1.4)\n<\/li>\n<li>Credentials from Password Stores (v1.0\u2192v1.1)\n<\/li>\n<li>Data Destruction (v1.1\u2192v1.2)\n<\/li>\n<li>Data from Cloud Storage (v2.0\u2192v2.1)\n<\/li>\n<li>Data from Network Shared Drive (v1.3\u2192v1.4)\n<\/li>\n<li>Deobfuscate\/Decode Files or Information (v1.2\u2192v1.3)\n<\/li>\n<li>Direct Volume Access (v2.0\u2192v2.1)\n<\/li>\n<li>Email Collection (v2.4\u2192v2.5)\n<\/li>\n<li>Remote Email Collection (v1.1\u2192v1.2)\n<\/li>\n<li>Event Triggered Execution: Screensaver (v1.1\u2192v1.2)\n<\/li>\n<li>Exfiltration Over Other Network Medium (v1.1\u2192v1.2)\n<\/li>\n<li>Exfiltration Over Web Service (v1.2\u2192v1.3)\n<\/li>\n<li>Exfiltration to Cloud Storage (v1.1\u2192v1.2)\n<\/li>\n<li>Exfiltration to Code Repository (v1.0\u2192v1.1)\n<\/li>\n<li>Exploitation for Credential Access (v1.4\u2192v1.5)\n<\/li>\n<li>Exploitation for Defense Evasion (v1.3\u2192v1.4)\n<\/li>\n<li>File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification (v1.1\u2192v1.2)\n<\/li>\n<li>Forced Authentication (v1.2\u2192v1.3)\n<\/li>\n<li>Forge Web Credentials (v1.3\u2192v1.4)\n<\/li>\n<li>Hide Artifacts: Email Hiding Rules (v1.2\u2192v1.3)\n<\/li>\n<li>Hijack Execution Flow: Path Interception by PATH Environment Variable (v1.0\u2192v1.1)\n<\/li>\n<li>Impair Defenses (v1.4\u2192v1.5)\n<\/li>\n<li>Disable Windows Event Logging (v1.2\u2192v1.3)\n<\/li>\n<li>Disable or Modify Tools (v1.4\u2192v1.5)\n<\/li>\n<li>Downgrade Attack (v1.1\u2192v1.2)\n<\/li>\n<li>Indicator Blocking (v1.2\u2192v1.3)\n<\/li>\n<li>Indicator Removal: Clear Network Connection History and Configurations (v1.0\u2192v1.1)\n<\/li>\n<li>Indicator Removal: Clear Windows Event Logs (v1.2\u2192v1.3)\n<\/li>\n<li>Ingress Tool Transfer (v2.2\u2192v2.3)\n<\/li>\n<li>Inhibit System Recovery (v1.2\u2192v1.3)\n<\/li>\n<li>Input Capture: Keylogging (v1.1\u2192v1.2)\n<\/li>\n<li>Inter-Process Communication: Dynamic Data Exchange (v1.2\u2192v1.3)\n<\/li>\n<li>Lateral Tool Transfer (v1.2\u2192v1.3)\n<\/li>\n<li>Masquerading (v1.5\u2192v1.6)\n<\/li>\n<li>Masquerade Task or Service (v1.1\u2192v1.2)\n<\/li>\n<li>Match Legitimate Name or Location (v1.1\u2192v1.2)\n<\/li>\n<li>Modify Authentication Process: Multi-Factor Authentication (v1.0\u2192v1.1)\n<\/li>\n<li>Modify Cloud Compute Infrastructure (v1.1\u2192v1.2)\n<\/li>\n<li>Modify Registry (v1.3\u2192v1.4)\n<\/li>\n<li>Native API (v2.1\u2192v2.2)\n<\/li>\n<li>Network Service Discovery (v3.0\u2192v3.1)\n<\/li>\n<li>Network Share Discovery (v3.1\u2192v3.2)\n<\/li>\n<li>Network Sniffing (v1.4\u2192v1.5)\n<\/li>\n<li>Non-Application Layer Protocol (v2.2\u2192v2.3)\n<\/li>\n<li>OS Credential Dumping: LSASS Memory (v1.2\u2192v1.3)\n<\/li>\n<li>OS Credential Dumping: NTDS (v1.1\u2192v1.2)\n<\/li>\n<li>OS Credential Dumping: Security Account Manager (v1.0\u2192v1.1)\n<\/li>\n<li>Obfuscated Files or Information (v1.4\u2192v1.5)\n<\/li>\n<li>Embedded Payloads (v1.0\u2192v1.1)\n<\/li>\n<li>HTML Smuggling (v1.0\u2192v1.1)\n<\/li>\n<li>Phishing (v2.3\u2192v2.4)\n<\/li>\n<li>Spearphishing Link (v2.4\u2192v2.5)\n<\/li>\n<li>Phishing for Information (v1.2\u2192v1.3)\n<\/li>\n<li>Spearphishing Link (v1.4\u2192v1.5)\n<\/li>\n<li>Process Discovery (v1.3\u2192v1.4)\n<\/li>\n<li>Process Injection: Dynamic-link Library Injection (v1.2\u2192v1.3)\n<\/li>\n<li>Process Injection: Process Hollowing (v1.2\u2192v1.3)\n<\/li>\n<li>Reflective Code Loading (v1.0\u2192v1.1)\n<\/li>\n<li>Remote Access Software (v2.1\u2192v2.2)\n<\/li>\n<li>Remote Service Session Hijacking: RDP Hijacking (v1.0\u2192v1.1)\n<\/li>\n<li>Remote Services (v1.3\u2192v1.4)\n<\/li>\n<li>Distributed Component Object Model (v1.2\u2192v1.3)\n<\/li>\n<li>Remote Desktop Protocol (v1.1\u2192v1.2)\n<\/li>\n<li>SMB\/Windows Admin Shares (v1.1\u2192v1.2)\n<\/li>\n<li>SSH (v1.1\u2192v1.2)\n<\/li>\n<li>Windows Remote Management (v1.1\u2192v1.2)\n<\/li>\n<li>Remote System Discovery (v3.4\u2192v3.5)\n<\/li>\n<li>Resource Hijacking (v1.3\u2192v1.4)\n<\/li>\n<li>Scheduled Task\/Job: At (v2.0\u2192v2.1)\n<\/li>\n<li>Scheduled Task\/Job: Scheduled Task (v1.3\u2192v1.4)\n<\/li>\n<li>Scheduled Task\/Job: Systemd Timers (v1.1\u2192v1.2)\n<\/li>\n<li>Shared Modules (v2.1\u2192v2.2)\n<\/li>\n<li>Software Deployment Tools (v2.1\u2192v2.2)\n<\/li>\n<li>Subvert Trust Controls: Install Root Certificate (v1.1\u2192v1.2)\n<\/li>\n<li>System Binary Proxy Execution: Rundll32 (v2.1\u2192v2.2)\n<\/li>\n<li>System Network Configuration Discovery (v1.5\u2192v1.6)\n<\/li>\n<li>System Owner\/User Discovery (v1.4\u2192v1.5)\n<\/li>\n<li>System Services: Service Execution (v1.1\u2192v1.2)\n<\/li>\n<li>Taint Shared Content (v1.3\u2192v1.4)\n<\/li>\n<li>Trusted Developer Utilities Proxy Execution: MSBuild (v1.2\u2192v1.3)\n<\/li>\n<li>Unsecured Credentials: Credentials In Files (v1.1\u2192v1.2)\n<\/li>\n<li>Unsecured Credentials: Credentials in Registry (v1.0\u2192v1.1)\n<\/li>\n<li>Use Alternate Authentication Material: Pass the Hash (v1.1\u2192v1.2)\n<\/li>\n<li>Valid Accounts: Cloud Accounts (v1.5\u2192v1.6)\n<\/li>\n<li>Valid Accounts: Domain Accounts (v1.3\u2192v1.4)\n<\/li>\n<li>Valid Accounts: Local Accounts (v1.3\u2192v1.4)\n<\/li>\n<li>Windows Management Instrumentation (v1.3\u2192v1.4)\n<\/li>\n<li>\n<h3>\u041f\u0430\u0442\u0447\u0438<\/h3>\n<div>\n<ul>\n<li>Cloud Service Discovery (v1.3)<br \/>\n&#8211; Event Triggered Execution: PowerShell Profile (v1.1)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Forge Web Credentials: SAML Tokens (v1.2)\n<\/li>\n<li>Forge Web Credentials: Web Cookies (v1.1)\n<\/li>\n<li>Masquerading: Masquerade File Type (v1.0)\n<\/li>\n<li>Masquerading: Rename System Utilities (v1.1)\n<\/li>\n<li>OS Credential Dumping: Cached Domain Credentials (v1.0)\n<\/li>\n<li>Replication Through Removable Media (v1.2)\n<\/li>\n<li>Steal Application Access Token (v1.2)\n<\/li>\n<li>Steal Web Session Cookie (v1.2)\n<\/li>\n<li>System Binary Proxy Execution: Compiled HTML File (v2.1)\n<\/li>\n<li>Use Alternate Authentication Material: Application Access Token (v1.5)\n<\/li>\n<li>Use Alternate Authentication Material: Web Session Cookie (v1.3)\n<\/li>\n<hr \/>\n<p><video src=\"\/wp-content\/uploads\/2023\/11\/mitre-update.mp4\" poster=\"\"><\/video><\/p>\n<h3>&#x2705; \u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043e 14 \u043d\u043e\u0432\u044b\u0445 \u041f\u041e \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0431\u043e\u043b\u0435\u0435 40 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u041f\u041e<\/h3>\n<hr \/>\n<ul>\n<li>\n<h3>\u041d\u043e\u0432\u043e\u0435 \u041f\u041e<\/h3>\n<div>\n<ul>\n<li>ANDROMEDA (v1.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>AsyncRAT (v1.0)\n<\/li>\n<li>BADHATCH (v1.0)\n<\/li>\n<li>Disco (v1.0)\n<\/li>\n<li>KOPILUWAK (v1.0)\n<\/li>\n<li>NightClub (v1.0)\n<\/li>\n<li>Pacu (v1.0)\n<\/li>\n<li>QUIETCANARY (v1.0)\n<\/li>\n<li>QUIETEXIT (v1.0)\n<\/li>\n<li>RotaJakiro (v1.0)\n<\/li>\n<li>Sardonic (v1.0)\n<\/li>\n<li>SharpDisco (v1.0)\n<\/li>\n<li>Snip3 (v1.0)\n<\/li>\n<li>ngrok (v1.2)\n<\/li>\n<\/ul>\n<li>\n<h3>\u041a\u0440\u0443\u043f\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438<\/h3>\n<div>\n<ul>\n<li>OSX_OCEANLOTUS.D (v2.2\u2192v3.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Uroburos (v1.0\u2192v2.0)\n<\/li>\n<li>\n<h3>\u041d\u0435\u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 <\/h3>\n<div>\n<ul>\n<li>AdFind (v1.2\u2192v1.3)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Agent Tesla (v1.2\u2192v1.3)\n<\/li>\n<li>Arp (v1.1\u2192v1.2)\n<\/li>\n<li>BITSAdmin (v1.3\u2192v1.4)\n<\/li>\n<li>BlackEnergy (v1.3\u2192v1.4)\n<\/li>\n<li>BloodHound (v1.4\u2192v1.5)\n<\/li>\n<li>Cobalt Strike (v1.10\u2192v1.11)\n<\/li>\n<li>Conti (v2.1\u2192v2.2)\n<\/li>\n<li>CrossRAT (v1.1\u2192v1.2)\n<\/li>\n<li>Dridex (v2.0\u2192v2.1)\n<\/li>\n<li>Emotet (v1.4\u2192v1.5)\n<\/li>\n<li>Empire (v1.6\u2192v1.7)\n<\/li>\n<li>Fysbis (v1.2\u2192v1.3)\n<\/li>\n<li>GoldMax (v2.1\u2192v2.2)\n<\/li>\n<li>Imminent Monitor (v1.0\u2192v1.1)\n<\/li>\n<li>Impacket (v1.4\u2192v1.5)\n<\/li>\n<li>KillDisk (v1.1\u2192v1.2)\n<\/li>\n<li>LaZagne (v1.4\u2192v1.5)\n<\/li>\n<li>Mimikatz (v1.7\u2192v1.8)\n<\/li>\n<li>NETWIRE (v1.5\u2192v1.6)\n<\/li>\n<li>Net (v2.4\u2192v2.5)\n<\/li>\n<li>Nltest (v1.1\u2192v1.2)\n<\/li>\n<li>OSX\/Shlayer (v1.3\u2192v1.4)\n<\/li>\n<li>Ping (v1.3\u2192v1.4)\n<\/li>\n<li>PsExec (v1.4\u2192v1.5)\n<\/li>\n<li>Pupy (v1.2\u2192v1.3)\n<\/li>\n<li>Ragnar Locker (v1.1\u2192v1.2)\n<\/li>\n<li>Regin (v1.1\u2192v1.2)\n<\/li>\n<li>Revenge RAT (v1.1\u2192v1.2)\n<\/li>\n<li>Rubeus (v1.0\u2192v1.1)\n<\/li>\n<li>Ryuk (v1.3\u2192v1.4)\n<\/li>\n<li>TrickBot (v2.0\u2192v2.1)\n<\/li>\n<li>WarzoneRAT (v1.0\u2192v1.1)\n<\/li>\n<li>certutil (v1.3\u2192v1.4)\n<\/li>\n<li>esentutl (v1.2\u2192v1.3)\n<\/li>\n<li>jRAT (v2.1\u2192v2.2)\n<\/li>\n<li>netstat (v1.1\u2192v1.2)\n<\/li>\n<li>njRAT (v1.4\u2192v1.5)\n<\/li>\n<li>\n<h3>\u041f\u0430\u0442\u0447\u0438<\/h3>\n<div>\n<ul>\n<li>BlackCat (v1.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Calisto (v1.1)\n<\/li>\n<li>Carbanak (v1.1)\n<\/li>\n<li>Doki (v1.0)\n<\/li>\n<li>Industroyer (v1.1)\n<\/li>\n<li>LockerGoga (v2.0)\n<\/li>\n<li>PUNCHBUGGY (v2.1)\n<\/li>\n<li>PUNCHTRACK (v1.1)\n<\/li>\n<li>PowerSploit (v1.6)\n<\/li>\n<hr \/>\n<h3>&#x2705; \u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043e 5 \u043d\u043e\u0432\u044b\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043e 17 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a<\/h3>\n<hr \/>\n<ul>\n<li>\n<h3>\u041d\u043e\u0432\u044b\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438<\/h3>\n<div>\n<ul>\n<li>FIN13 (v1.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>MoustachedBouncer (v1.0)\n<\/li>\n<li>Scattered Spider (v1.0)\n<\/li>\n<li>TA2541 (v1.0)\n<\/li>\n<li>Volt Typhoon (v1.0)\n<\/li>\n<\/ul>\n<li>\n<h3>\u041a\u0440\u0443\u043f\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438<\/h3>\n<div>\n<ul>\n<li>APT29 (v4.0\u2192v5.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>FIN7 (v2.2\u2192v3.0)\n<\/li>\n<li>FIN8 (v1.3\u2192v2.0)\n<\/li>\n<li>Indrik Spider (v2.1\u2192v3.0)\n<\/li>\n<li>Turla (v3.1\u2192v4.0)\n<\/li>\n<li>Wizard Spider (v2.1\u2192v3.0)\n<\/li>\n<li>\n<h3>\u041d\u0435\u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 <\/h3>\n<div>\n<ul>\n<li>APT32 (v2.6\u2192v2.7)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Confucius (v1.0\u2192v1.1)\n<\/li>\n<li>Dragonfly (v3.1\u2192v3.2)\n<\/li>\n<li>LAPSUS$ (v1.1\u2192v1.2)\n<\/li>\n<li>Magic Hound (v5.1\u2192v5.2)\n<\/li>\n<li>Sandworm Team (v3.0\u2192v3.1)\n<\/li>\n<li>SilverTerrier (v1.1\u2192v1.2)\n<\/li>\n<li>\n<h3>\u041f\u0430\u0442\u0447\u0438<\/h3>\n<div>\n<ul>\n<li>APT37 (v2.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>Ajax Security Team (v1.0)\n<\/li>\n<li>Darkhotel (v2.1)\n<\/li>\n<li>Kimsuky (v3.1)\n<\/li>\n<hr \/>\n<h3>&#x2705; \u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043e 3 \u043d\u043e\u0432\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0439 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0430 1 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0430\u044f<\/h3>\n<hr \/>\n<ul>\n<li>\n<h3>\u041d\u043e\u0432\u044b\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438<\/h3>\n<div>\n<ul>\n<li>2015 Ukraine Electric Power Attack (v1.0)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>C0026 (v1.0)\n<\/li>\n<li>C0027 (v1.0)\n<\/li>\n<\/ul>\n<li>\n<h3>\u041d\u0435\u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 <\/h3>\n<div>\n<ul>\n<li>Operation Dream Job (v1.0\u2192v1.1)\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<hr \/>\n<div>\u042d\u0442\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u0438 \u043d\u0430\u043c \u0443\u043b\u0443\u0447\u0448\u0438\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0443 \u043c\u043e\u0434\u0443\u043b\u044f \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u043c\u0435\u043d\u044f\u044e\u0449\u0438\u0445\u0441\u044f \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0438 \u0442\u0430\u043a\u0442\u0438\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432. \u0422\u0430\u043a\u0436\u0435 \u0445\u043e\u0442\u0438\u043c \u0437\u0430\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u043d\u0435 \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u0443\u0435\u043c\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 MITRE ATT<font face=\"Arial\">&#038;<\/font>CK. \u041c\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0441\u043b\u0435\u0434\u0438\u043c \u0437\u0430 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u043c\u0438 \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u044f\u043c\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0435\u043c \u043a\u043e\u043d\u0442\u0435\u043d\u0442 \u0432 \u043d\u0430\u0448\u0438\u0445 \u043c\u043e\u0434\u0443\u043b\u044f\u0445 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437, \u043d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e \u043e\u0442 \u0432\u044b\u0445\u043e\u0434\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 MITRE. \u041d\u0430\u0448\u0430 \u0446\u0435\u043b\u044c \u2014 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u0437\u0430\u0449\u0438\u0442\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u043d\u0430\u0448\u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043c\u044b \u0432\u0441\u0435\u0433\u0434\u0430 \u0433\u043e\u0442\u043e\u0432\u044b \u043a \u0431\u044b\u0441\u0442\u0440\u044b\u043c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f\u043c \u0438 \u0430\u0434\u0430\u043f\u0442\u0430\u0446\u0438\u0438 \u043a \u043d\u043e\u0432\u044b\u043c \u0443\u0433\u0440\u043e\u0437\u0430\u043c.<\/div>\n<div>\u0415\u0441\u043b\u0438 \u0432\u0430\u0441 \u0437\u0430\u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043e\u0432\u0430\u043b \u043c\u043e\u0434\u0443\u043b\u044c, \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0440\u0430\u0441\u0441\u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0441\u0442\u043e\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043d\u0430\u0448\u0435\u0433\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043a\u0430\u043b\u044c\u043a\u0443\u043b\u044f\u0442\u043e\u0440\u0430.<\/div>\n<p>\n    <a href=\"https:\/\/volgablob.ru\/pricing\">\u0420\u0430\u0441\u0441\u0447\u0438\u0442\u0430\u0442\u044c \u0441\u0442\u043e\u0438\u043c\u043e\u0441\u0442\u044c<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/11\/price.svg\" alt=\"\"\/><\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"small\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\ud83d\\ude80 \\u041e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0438\\u0435 \\u043c\\u043e\\u0434\\u0443\\u043b\\u044f MITRE ATT<font face=\\\"Arial\\\">&<\\\/font>CK\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"31 \\u043e\\u043a\\u0442\\u044f\\u0431\\u0440\\u044f 2023 \\u0433\\u043e\\u0434\\u0430 \\u0431\\u044b\\u043b\\u0430 \\u0432\\u044b\\u043f\\u0443\\u0449\\u0435\\u043d\\u0430 \\u043d\\u043e\\u0432\\u0430\\u044f 14-\\u044f \\u0432\\u0435\\u0440\\u0441\\u0438\\u044f MITRE ATT<\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\/font><font face=\\\"Arial\\\">&<\\\/font>CK. \\u041c\\u044b \\u0443\\u0436\\u0435 \\u0432\\u043d\\u0435\\u0434\\u0440\\u0438\\u043b\\u0438 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u043d\\u0430\\u0448\\u0443 \\u0443\\u043d\\u0438\\u0432\\u0435\\u0440\\u0441\\u0430\\u043b\\u044c\\u043d\\u0443\\u044e \\u043f\\u043b\\u0430\\u0442\\u0444\\u043e\\u0440\\u043c\\u0443 Smart Monitor. \\u0412 \\u0447\\u0430\\u0441\\u0442\\u043d\\u043e\\u0441\\u0442\\u0438, \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0438\\u044f \\u0437\\u0430\\u0442\\u0440\\u043e\\u043d\\u0443\\u043b\\u0438 <a href=\\\"https:\\\/\\\/volgablob.ru\\\/ru\\\/sm\\\/ma\\\">\\u043c\\u043e\\u0434\\u0443\\u043b\\u044c MITRE ATT<font face=\\\"Arial\\\">&<\\\/font>CK<\\\/a>. \\u0412 \\u044d\\u0442\\u043e\\u0439 \\u0441\\u0442\\u0430\\u0442\\u044c\\u0435 \\u0445\\u043e\\u0442\\u0438\\u043c \\u043f\\u043e\\u0434\\u0435\\u043b\\u0438\\u0442\\u044c\\u0441\\u044f \\u043f\\u043e\\u0434\\u0440\\u043e\\u0431\\u043d\\u043e\\u0441\\u0442\\u044f\\u043c\\u0438 \\u0440\\u0435\\u043b\\u0438\\u0437\\u0430.\\n\\n\\n\",\"margin\":\"medium\"}}]}]}],\"name\":\"\\u0422\\u0438\\u0442\\u0443\\u043b\\u044c\\u043d\\u0438\\u043a\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"small\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"video\",\"props\":{\"margin\":\"default\",\"video\":\"wp-content\\\/uploads\\\/2023\\\/11\\\/mitre-update-illustration.mp4\",\"video_autoplay\":true,\"video_controls\":false,\"video_loop\":true,\"video_muted\":true,\"video_playsinline\":true,\"visibility\":\"m\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\u0421\\u043e\\u0434\\u0435\\u0440\\u0436\\u0430\\u043d\\u0438\\u0435\",\"title_element\":\"h3\"}},{\"type\":\"list\",\"props\":{\"column_breakpoint\":\"m\",\"image_align\":\"left\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_element\":\"ul\",\"list_horizontal_separator\":\", \",\"list_marker\":\"decimal\",\"list_type\":\"vertical\",\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"list_item\",\"props\":{\"content\":\"\\u0422\\u0435\\u0445\\u043d\\u0438\\u043a\\u0438\",\"link\":\"#techniques\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\\u041f\\u041e\",\"link\":\"#software\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\\u0413\\u0440\\u0443\\u043f\\u043f\\u0438\\u0440\\u043e\\u0432\\u043a\\u0438\",\"link\":\"#groups\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\\u0425\\u0430\\u043a\\u0435\\u0440\\u0441\\u043a\\u0438\\u0435 \\u043a\\u0430\\u043c\\u043f\\u0430\\u043d\\u0438\\u0438\",\"link\":\"#campaigns\"}}]}]}],\"props\":{\"layout\":\"1-2,1-2\"}}],\"name\":\"\\u0421\\u043e\\u0434\\u0435\\u0440\\u0436\\u0430\\u043d\\u0438\\u0435\"},{\"type\":\"section\",\"props\":{\"id\":\"techniques\",\"image_position\":\"center-center\",\"padding_remove_bottom\":true,\"style\":\"secondary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\u2705 \\u0412 14-\\u0439 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 Enterprise MITRE ATT<\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\\\/font><\/font><font face=\\\"Arial\\\">&<\\\/font>CK \\u0434\\u043e\\u0431\\u0430\\u0432\\u043b\\u0435\\u043d\\u043e 18 \\u043d\\u043e\\u0432\\u044b\\u0445 \\u0442\\u0435\\u0445\\u043d\\u0438\\u043a \\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u043e \\u0431\\u043e\\u043b\\u0435\\u0435 100 \\u0441\\u0443\\u0449\\u0435\\u0441\\u0442\\u0432\\u0443\\u044e\\u0449\\u0438\\u0445 \\u0442\\u0435\\u0445\\u043d\\u0438\\u043a\",\"title_element\":\"h3\"}},{\"type\":\"list\",\"props\":{\"column_breakpoint\":\"m\",\"image_align\":\"left\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_element\":\"ul\",\"list_horizontal_separator\":\", \",\"list_type\":\"vertical\",\"show_image\":true,\"show_link\":true,\"status\":\"disabled\"},\"children\":[{\"type\":\"list_item\",\"props\":{\"content\":\"\\u0412 14-\\u0439 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 Enterprise MITRE ATT<\\\/font><\\\/font><\\\/font><\/font><font face=\\\"Arial\\\">&<\\\/font>CK \\u0434\\u043e\\u0431\\u0430\\u0432\\u043b\\u0435\\u043d\\u043e 18 \\u043d\\u043e\\u0432\\u044b\\u0445 \\u0442\\u0435\\u0445\\u043d\\u0438\\u043a \\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u043e \\u0431\\u043e\\u043b\\u0435\\u0435 100 \\u0441\\u0443\\u0449\\u0435\\u0441\\u0442\\u0432\\u0443\\u044e\\u0449\\u0438\\u0445 \\u0442\\u0435\\u0445\\u043d\\u0438\\u043a\",\"image\":\"wp-content\\\/uploads\\\/2023\\\/11\\\/success-icon.svg\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"accordion\",\"props\":{\"collapsible\":true,\"content_column\":\"1-2\",\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"css\":\"\\n\\n\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"multiple\":true,\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Account Manipulation: Additional Container Cluster Roles (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Content Injection (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Credentials from Password Stores: Cloud Secrets Management Stores (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exfiltration Over Web Service: Exfiltration Over Webhook (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Financial Theft (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Hide Artifacts: Ignore Process Interrupts (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Impair Defenses: Disable or Modify Linux Audit System (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Impersonation (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Log Enumeration (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Masquerading: Break Process Trees (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Obfuscated Files or Information: LNK Icon Smuggling (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Phishing: Spearphishing Voice (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Phishing for Information: Spearphishing Voice (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Power Settings (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Services: Direct Cloud VM Connections (v1.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Network Configuration Discovery: Wi-Fi Discovery (v1.0)<\\\/li>\\n<\\\/ul>\",\"image\":\"\",\"title\":\"\\u041d\\u043e\\u0432\\u044b\\u0435 \\u0442\\u0435\\u0445\\u043d\\u0438\\u043a\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>Boot or Logon Autostart Execution: Registry Run Keys \\\/ Startup Folder (v1.2\\u2192v2.0)<\\\/li>\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Impair Defenses: Disable or Modify Cloud Logs (v1.3\\u2192v2.0)<\\\/li>\\n<\\\/ul>\\n\",\"title\":\"\\u041a\\u0440\\u0443\\u043f\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>Abuse Elevation Control Mechanism (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Access Token Manipulation: Token Impersonation\\\/Theft (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Account Manipulation (v2.5\\u2192v2.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Additional Cloud Credentials (v2.5\\u2192v2.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Additional Cloud Roles (v2.2\\u2192v2.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Additional Email Delegate Permissions (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Device Registration (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>SSH Authorized Keys (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Acquire Infrastructure (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Adversary-in-the-Middle (v2.2\\u2192v2.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Application Layer Protocol: File Transfer Protocols (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Application Layer Protocol: Web Protocols (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Archive Collected Data: Archive via Utility (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Boot or Logon Autostart Execution: Print Processors (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Boot or Logon Autostart Execution: Winlogon Helper DLL (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Boot or Logon Autostart Execution: XDG Autostart Entries (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Boot or Logon Initialization Scripts (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Brute Force: Credential Stuffing (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Brute Force: Password Guessing (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Brute Force: Password Spraying (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Cloud Service Dashboard (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Command and Scripting Interpreter: Windows Command Shell (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Compromise Client Software Binary (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Compromise Infrastructure (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Create Account (v2.3\\u2192v2.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Cloud Account (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Domain Account (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Local Account (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Create or Modify System Process: Systemd Service (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Create or Modify System Process: Windows Service (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Credentials from Password Stores (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Data Destruction (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Data from Cloud Storage (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Data from Network Shared Drive (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Deobfuscate\\\/Decode Files or Information (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Direct Volume Access (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Email Collection (v2.4\\u2192v2.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Email Collection (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Event Triggered Execution: Screensaver (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exfiltration Over Other Network Medium (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exfiltration Over Web Service (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exfiltration to Cloud Storage (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exfiltration to Code Repository (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exploitation for Credential Access (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Exploitation for Defense Evasion (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Forced Authentication (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Forge Web Credentials (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Hide Artifacts: Email Hiding Rules (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Hijack Execution Flow: Path Interception by PATH Environment Variable (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Impair Defenses (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Disable Windows Event Logging (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Disable or Modify Tools (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Downgrade Attack (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Indicator Blocking (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Indicator Removal: Clear Network Connection History and Configurations (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Indicator Removal: Clear Windows Event Logs (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Ingress Tool Transfer (v2.2\\u2192v2.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Inhibit System Recovery (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Input Capture: Keylogging (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Inter-Process Communication: Dynamic Data Exchange (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Lateral Tool Transfer (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Masquerading (v1.5\\u2192v1.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Masquerade Task or Service (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Match Legitimate Name or Location (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Modify Authentication Process: Multi-Factor Authentication (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Modify Cloud Compute Infrastructure (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Modify Registry (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Native API (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Network Service Discovery (v3.0\\u2192v3.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Network Share Discovery (v3.1\\u2192v3.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Network Sniffing (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Non-Application Layer Protocol (v2.2\\u2192v2.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>OS Credential Dumping: LSASS Memory (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>OS Credential Dumping: NTDS (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>OS Credential Dumping: Security Account Manager (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Obfuscated Files or Information (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Embedded Payloads (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>HTML Smuggling (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Phishing (v2.3\\u2192v2.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Spearphishing Link (v2.4\\u2192v2.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Phishing for Information (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Spearphishing Link (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Process Discovery (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Process Injection: Dynamic-link Library Injection (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Process Injection: Process Hollowing (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Reflective Code Loading (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Access Software (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Service Session Hijacking: RDP Hijacking (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Services (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Distributed Component Object Model (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote Desktop Protocol (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>SMB\\\/Windows Admin Shares (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>SSH (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Windows Remote Management (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Remote System Discovery (v3.4\\u2192v3.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Resource Hijacking (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Scheduled Task\\\/Job: At (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Scheduled Task\\\/Job: Scheduled Task (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Scheduled Task\\\/Job: Systemd Timers (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Shared Modules (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Software Deployment Tools (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Subvert Trust Controls: Install Root Certificate (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Binary Proxy Execution: Rundll32 (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Network Configuration Discovery (v1.5\\u2192v1.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Owner\\\/User Discovery (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Services: Service Execution (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Taint Shared Content (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Trusted Developer Utilities Proxy Execution: MSBuild (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Unsecured Credentials: Credentials In Files (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Unsecured Credentials: Credentials in Registry (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Use Alternate Authentication Material: Pass the Hash (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Valid Accounts: Cloud Accounts (v1.5\\u2192v1.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Valid Accounts: Domain Accounts (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Valid Accounts: Local Accounts (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Windows Management Instrumentation (v1.3\\u2192v1.4)\\n<\\\/ul>\",\"title\":\"\\u041d\\u0435\\u0437\\u043d\\u0430\\u0447\\u0438\\u0442\\u0435\\u043b\\u044c\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 \"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>Cloud Service Discovery (v1.3)\\n- Event Triggered Execution: PowerShell Profile (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Forge Web Credentials: SAML Tokens (v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Forge Web Credentials: Web Cookies (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Masquerading: Masquerade File Type (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Masquerading: Rename System Utilities (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>OS Credential Dumping: Cached Domain Credentials (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Replication Through Removable Media (v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Steal Application Access Token (v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Steal Web Session Cookie (v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>System Binary Proxy Execution: Compiled HTML File (v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Use Alternate Authentication Material: Application Access Token (v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Use Alternate Authentication Material: Web Session Cookie (v1.3)\\n<\\\/ul>\",\"title\":\"\\u041f\\u0430\\u0442\\u0447\\u0438\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"video\",\"props\":{\"margin\":\"default\",\"video\":\"wp-content\\\/uploads\\\/2023\\\/11\\\/mitre-update.mp4\",\"video_autoplay\":true,\"video_controls\":false,\"video_lazyload\":false,\"video_loop\":true,\"video_muted\":true,\"video_playsinline\":true},\"name\":\"\\u041e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0438\\u0435 \\u0432 SM\"}]}]}],\"name\":\"\\u0422\\u0435\\u0445\\u043d\\u0438\\u043a\\u0438\"},{\"type\":\"section\",\"props\":{\"id\":\"software\",\"image_position\":\"center-center\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"secondary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\u2705 \\u0414\\u043e\\u0431\\u0430\\u0432\\u043b\\u0435\\u043d\\u043e 14 \\u043d\\u043e\\u0432\\u044b\\u0445 \\u041f\\u041e \\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u043e \\u0431\\u043e\\u043b\\u0435\\u0435 40 \\u0441\\u0443\\u0449\\u0435\\u0441\\u0442\\u0432\\u0443\\u044e\\u0449\\u0438\\u0445 \\u041f\\u041e\",\"title_element\":\"h3\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"accordion\",\"props\":{\"collapsible\":true,\"content_column\":\"1-2\",\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"multiple\":true,\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>ANDROMEDA (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>AsyncRAT (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>BADHATCH (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Disco (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>KOPILUWAK (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>NightClub (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Pacu (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>QUIETCANARY (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>QUIETEXIT (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>RotaJakiro (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Sardonic (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>SharpDisco (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Snip3 (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>ngrok (v1.2)\\n<\\\/ul>\",\"image\":\"\",\"title\":\"\\u041d\\u043e\\u0432\\u043e\\u0435 \\u041f\\u041e\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>OSX_OCEANLOTUS.D (v2.2\\u2192v3.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Uroburos (v1.0\\u2192v2.0)\\n<\\\/ul>\\n\",\"title\":\"\\u041a\\u0440\\u0443\\u043f\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>AdFind (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Agent Tesla (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Arp (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>BITSAdmin (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>BlackEnergy (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>BloodHound (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Cobalt Strike (v1.10\\u2192v1.11)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Conti (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>CrossRAT (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Dridex (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Emotet (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Empire (v1.6\\u2192v1.7)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Fysbis (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>GoldMax (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Imminent Monitor (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Impacket (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>KillDisk (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>LaZagne (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Mimikatz (v1.7\\u2192v1.8)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>NETWIRE (v1.5\\u2192v1.6)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Net (v2.4\\u2192v2.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Nltest (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>OSX\\\/Shlayer (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Ping (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>PsExec (v1.4\\u2192v1.5)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Pupy (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Ragnar Locker (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Regin (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Revenge RAT (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Rubeus (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Ryuk (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>TrickBot (v2.0\\u2192v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>WarzoneRAT (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>certutil (v1.3\\u2192v1.4)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>esentutl (v1.2\\u2192v1.3)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>jRAT (v2.1\\u2192v2.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>netstat (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>njRAT (v1.4\\u2192v1.5)\\n<\\\/ul>\",\"title\":\"\\u041d\\u0435\\u0437\\u043d\\u0430\\u0447\\u0438\\u0442\\u0435\\u043b\\u044c\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 \"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>BlackCat (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Calisto (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Carbanak (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Doki (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Industroyer (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>LockerGoga (v2.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>PUNCHBUGGY (v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>PUNCHTRACK (v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>PowerSploit (v1.6)\\n<\\\/ul>\",\"title\":\"\\u041f\\u0430\\u0442\\u0447\\u0438\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}}]}]}],\"name\":\"\\u041f\\u041e\"},{\"type\":\"section\",\"props\":{\"id\":\"groups\",\"image_position\":\"center-center\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"secondary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\u2705 \\u0414\\u043e\\u0431\\u0430\\u0432\\u043b\\u0435\\u043d\\u043e 5 \\u043d\\u043e\\u0432\\u044b\\u0445 \\u0433\\u0440\\u0443\\u043f\\u043f\\u0438\\u0440\\u043e\\u0432\\u043e\\u043a \\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u043e 17 \\u0441\\u0443\\u0449\\u0435\\u0441\\u0442\\u0432\\u0443\\u044e\\u0449\\u0438\\u0445 \\u0433\\u0440\\u0443\\u043f\\u043f\\u0438\\u0440\\u043e\\u0432\\u043e\\u043a\",\"title_element\":\"h3\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"accordion\",\"props\":{\"collapsible\":true,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"multiple\":true,\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>FIN13 (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>MoustachedBouncer (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Scattered Spider (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>TA2541 (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Volt Typhoon (v1.0)\\n<\\\/ul>\",\"image\":\"\",\"title\":\"\\u041d\\u043e\\u0432\\u044b\\u0435 \\u0433\\u0440\\u0443\\u043f\\u043f\\u0438\\u0440\\u043e\\u0432\\u043a\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>APT29 (v4.0\\u2192v5.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>FIN7 (v2.2\\u2192v3.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>FIN8 (v1.3\\u2192v2.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Indrik Spider (v2.1\\u2192v3.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Turla (v3.1\\u2192v4.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Wizard Spider (v2.1\\u2192v3.0)\\n<\\\/ul>\\n\",\"title\":\"\\u041a\\u0440\\u0443\\u043f\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>APT32 (v2.6\\u2192v2.7)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Confucius (v1.0\\u2192v1.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Dragonfly (v3.1\\u2192v3.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>LAPSUS$ (v1.1\\u2192v1.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Magic Hound (v5.1\\u2192v5.2)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Sandworm Team (v3.0\\u2192v3.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>SilverTerrier (v1.1\\u2192v1.2)\\n<\\\/ul>\",\"title\":\"\\u041d\\u0435\\u0437\\u043d\\u0430\\u0447\\u0438\\u0442\\u0435\\u043b\\u044c\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 \"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>APT37 (v2.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Ajax Security Team (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Darkhotel (v2.1)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>Kimsuky (v3.1)\\n<\\\/ul>\",\"title\":\"\\u041f\\u0430\\u0442\\u0447\\u0438\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}}]}]}],\"name\":\"\\u0413\\u0440\\u0443\\u043f\\u043f\\u0438\\u0440\\u043e\\u0432\\u043a\\u0438\"},{\"type\":\"section\",\"props\":{\"id\":\"campaigns\",\"image_position\":\"center-center\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"secondary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\u2705 \\u0414\\u043e\\u0431\\u0430\\u0432\\u043b\\u0435\\u043d\\u043e 3 \\u043d\\u043e\\u0432\\u044b\\u0445 \\u0445\\u0430\\u043a\\u0435\\u0440\\u0441\\u043a\\u0438\\u0445 \\u043a\\u0430\\u043c\\u043f\\u0430\\u043d\\u0438\\u0439 \\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0430 1 \\u0441\\u0443\\u0449\\u0435\\u0441\\u0442\\u0432\\u0443\\u044e\\u0449\\u0430\\u044f\",\"title_element\":\"h3\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"accordion\",\"props\":{\"collapsible\":true,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"multiple\":true,\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul> \\n\n\n<li>2015 Ukraine Electric Power Attack (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>C0026 (v1.0)\\n<\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\\\/li><\/li>\n\n\n\n<li>C0027 (v1.0)\\n<\\\/ul>\",\"image\":\"\",\"title\":\"\\u041d\\u043e\\u0432\\u044b\\u0435 \\u043a\\u0430\\u043c\\u043f\\u0430\\u043d\\u0438\\u0438\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<ul>\\n\n\n<li>Operation Dream Job (v1.0\\u2192v1.1)\\n<\\\/ul>\",\"title\":\"\\u041d\\u0435\\u0437\\u043d\\u0430\\u0447\\u0438\\u0442\\u0435\\u043b\\u044c\\u043d\\u044b\\u0435 \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f \\u0432 \\u0432\\u0435\\u0440\\u0441\\u0438\\u0438 \"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}}]}]}],\"name\":\"\\u0425\\u0430\\u043a\\u0435\\u0440\\u0441\\u043a\\u0438\\u0435 \\u043a\\u0430\\u043c\\u043f\\u0430\\u043d\\u0438\\u0438\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"secondary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\\u042d\\u0442\\u0438 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0438\\u044f \\u043f\\u043e\\u0437\\u0432\\u043e\\u043b\\u0438\\u043b\\u0438 \\u043d\\u0430\\u043c \\u0443\\u043b\\u0443\\u0447\\u0448\\u0438\\u0442\\u044c \\u0440\\u0430\\u0431\\u043e\\u0442\\u0443 \\u043c\\u043e\\u0434\\u0443\\u043b\\u044f \\u0438 \\u043e\\u0431\\u0435\\u0441\\u043f\\u0435\\u0447\\u0438\\u0442\\u044c \\u0431\\u043e\\u043b\\u0435\\u0435 \\u0432\\u044b\\u0441\\u043e\\u043a\\u0438\\u0439 \\u0443\\u0440\\u043e\\u0432\\u0435\\u043d\\u044c \\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u0438 \\u043f\\u0440\\u043e\\u0442\\u0438\\u0432 \\u043f\\u043e\\u0441\\u0442\\u043e\\u044f\\u043d\\u043d\\u043e \\u043c\\u0435\\u043d\\u044f\\u044e\\u0449\\u0438\\u0445\\u0441\\u044f \\u043c\\u0435\\u0442\\u043e\\u0434\\u043e\\u0432 \\u0438 \\u0442\\u0430\\u043a\\u0442\\u0438\\u043a \\u0437\\u043b\\u043e\\u0443\\u043c\\u044b\\u0448\\u043b\\u0435\\u043d\\u043d\\u0438\\u043a\\u043e\\u0432. \\u0422\\u0430\\u043a\\u0436\\u0435 \\u0445\\u043e\\u0442\\u0438\\u043c \\u0437\\u0430\\u043c\\u0435\\u0442\\u0438\\u0442\\u044c, \\u0447\\u0442\\u043e \\u043d\\u0435 \\u043e\\u0440\\u0438\\u0435\\u043d\\u0442\\u0438\\u0440\\u0443\\u0435\\u043c\\u0441\\u044f \\u0442\\u043e\\u043b\\u044c\\u043a\\u043e \\u043d\\u0430 MITRE ATT<font face=\\\"Arial\\\">&<\\\/font>CK. \\u041c\\u044b \\u043f\\u043e\\u0441\\u0442\\u043e\\u044f\\u043d\\u043d\\u043e \\u0441\\u043b\\u0435\\u0434\\u0438\\u043c \\u0437\\u0430 \\u0441\\u043e\\u0432\\u0440\\u0435\\u043c\\u0435\\u043d\\u043d\\u044b\\u043c\\u0438 \\u0442\\u0435\\u043d\\u0434\\u0435\\u043d\\u0446\\u0438\\u044f\\u043c\\u0438 \\u043a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u0438 \\u0438 \\u0440\\u0430\\u0437\\u0432\\u0438\\u0432\\u0430\\u0435\\u043c \\u043a\\u043e\\u043d\\u0442\\u0435\\u043d\\u0442 \\u0432 \\u043d\\u0430\\u0448\\u0438\\u0445 \\u043c\\u043e\\u0434\\u0443\\u043b\\u044f\\u0445 \\u0434\\u043b\\u044f \\u043a\\u043e\\u043d\\u0442\\u0440\\u043e\\u043b\\u044f \\u0430\\u043a\\u0442\\u0443\\u0430\\u043b\\u044c\\u043d\\u044b\\u0445 \\u0443\\u0433\\u0440\\u043e\\u0437, \\u043d\\u0435\\u0437\\u0430\\u0432\\u0438\\u0441\\u0438\\u043c\\u043e \\u043e\\u0442 \\u0432\\u044b\\u0445\\u043e\\u0434\\u0430 \\u043e\\u0431\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u0438\\u0439 MITRE. \\u041d\\u0430\\u0448\\u0430 \\u0446\\u0435\\u043b\\u044c \\u2014 \\u043e\\u0431\\u0435\\u0441\\u043f\\u0435\\u0447\\u0438\\u0442\\u044c \\u043c\\u0430\\u043a\\u0441\\u0438\\u043c\\u0430\\u043b\\u044c\\u043d\\u0443\\u044e \\u0437\\u0430\\u0449\\u0438\\u0442\\u0443 \\u0434\\u0430\\u043d\\u043d\\u044b\\u0445 \\u0438 \\u0438\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0438\\u043e\\u043d\\u043d\\u044b\\u0445 \\u0440\\u0435\\u0441\\u0443\\u0440\\u0441\\u043e\\u0432 \\u043d\\u0430\\u0448\\u0438\\u0445 \\u043a\\u043b\\u0438\\u0435\\u043d\\u0442\\u043e\\u0432, \\u043f\\u043e\\u044d\\u0442\\u043e\\u043c\\u0443 \\u043c\\u044b \\u0432\\u0441\\u0435\\u0433\\u0434\\u0430 \\u0433\\u043e\\u0442\\u043e\\u0432\\u044b \\u043a \\u0431\\u044b\\u0441\\u0442\\u0440\\u044b\\u043c \\u0438\\u0437\\u043c\\u0435\\u043d\\u0435\\u043d\\u0438\\u044f\\u043c \\u0438 \\u0430\\u0434\\u0430\\u043f\\u0442\\u0430\\u0446\\u0438\\u0438 \\u043a \\u043d\\u043e\\u0432\\u044b\\u043c \\u0443\\u0433\\u0440\\u043e\\u0437\\u0430\\u043c.\",\"margin\":\"medium\"}}]}]}],\"name\":\"\\u0420\\u0435\\u0430\\u043b\\u0438\\u0437\\u0430\\u0446\\u0438\\u044f \\u0432 SM\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"xsmall\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\\u0415\\u0441\\u043b\\u0438 \\u0432\\u0430\\u0441 \\u0437\\u0430\\u0438\\u043d\\u0442\\u0435\\u0440\\u0435\\u0441\\u043e\\u0432\\u0430\\u043b \\u043c\\u043e\\u0434\\u0443\\u043b\\u044c, \\u0432\\u044b \\u043c\\u043e\\u0436\\u0435\\u0442\\u0435 \\u0440\\u0430\\u0441\\u0441\\u0447\\u0438\\u0442\\u0430\\u0442\\u044c \\u043f\\u0435\\u0440\\u0441\\u043e\\u043d\\u0430\\u043b\\u0438\\u0437\\u0438\\u0440\\u043e\\u0432\\u0430\\u043d\\u043d\\u0443\\u044e \\u0441\\u0442\\u043e\\u0438\\u043c\\u043e\\u0441\\u0442\\u044c \\u0441 \\u043f\\u043e\\u043c\\u043e\\u0449\\u044c\\u044e \\u043d\\u0430\\u0448\\u0435\\u0433\\u043e \\u043e\\u0442\\u043a\\u0440\\u044b\\u0442\\u043e\\u0433\\u043e \\u043a\\u0430\\u043b\\u044c\\u043a\\u0443\\u043b\\u044f\\u0442\\u043e\\u0440\\u0430.\",\"margin\":\"default\",\"text_style\":\"lead\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"\\u0420\\u0430\\u0441\\u0441\\u0447\\u0438\\u0442\\u0430\\u0442\\u044c \\u0441\\u0442\\u043e\\u0438\\u043c\\u043e\\u0441\\u0442\\u044c\",\"icon\":\"cart\",\"icon_align\":\"left\",\"link\":\"https:\\\/\\\/volgablob.ru\\\/pricing\",\"link_target\":\"blank\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2023\\\/11\\\/price.svg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}}]}]}],\"name\":\"CTA\"}],\"version\":\"4.2.0\"} --><\/font><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><\/font><\/a><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>31.10.2023 \u0431\u044b\u043b\u0430 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u0430 \u043d\u043e\u0432\u0430\u044f 14-\u044f \u0432\u0435\u0440\u0441\u0438\u044f MITRE ATT&#038;CK. \u041c\u044b \u0443\u0436\u0435 \u0432\u043d\u0435\u0434\u0440\u0438\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043d\u0430\u0448\u0443 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443 Smart Monitor. \u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0445\u043e\u0442\u0438\u043c \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0440\u0435\u043b\u0438\u0437\u0430.<\/p>\n","protected":false},"author":14,"featured_media":5473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[189,188,57],"class_list":["post-5420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-mitre-attck","tag-release","tag-smart-monitor"],"_links":{"self":[{"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/posts\/5420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5420"}],"version-history":[{"count":48,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/posts\/5420\/revisions"}],"predecessor-version":[{"id":5469,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/posts\/5420\/revisions\/5469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=\/wp\/v2\/media\/5473"}],"wp:attachment":[{"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.volgablob.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}