Preparation
Archive Data
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Device Mounting
Email Collection
External Media Formatting
File Exploration
IT Ticketing System Exploration
Network Scanning
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
- ID: AR3
- Created: 22nd May 2024
- Updated: 23rd July 2024
Preparation
The activities conducted by a subject to aid or enable an infringement.
Sections
ID | Name | Description |
---|---|---|
PR017 | Archive Data | A subject uses utilities to compress and/or encrypt collected data prior to exfiltration. |
PR011 | Boot Order Manipulation | A subject accesses BIOS or UEFI to manipulate the boot order of a target computer to boot from an external device in order to access the target computer's file system without needing to interact or authenticate with the Operating System of the target computer. |
PR007 | CCTV Enumeration | A subject observes and/or records the locations of CCTV cameras in a target area. |
PR018 | Circumventing Security Controls | A subject abuses their access or conducts unapproved changes to circumvent host-based security controls. |
PR020 | Data Obfuscation | Data obfuscation is the act of deliberately obscuring or disguising data to avoid detection and/or hinder forensic analysis. A subject may obscure data in preparation to exfiltrate the data. |
PR016 | Data Staging | A subject stages collected data in a central location or directory prior to exfiltration. |
PR002 | Device Mounting | A subject may mount an external device or network device to establish a means of exfiltrating sensitive data. |
PR015 | Email Collection | A subject may target user email to collect sensitive information. |
PR014 | External Media Formatting | A subject formats an external media device on a target system with a compatible file system which is capable of being written to by the target system. |
PR004 | File Exploration | A subject may search for, or otherwise explore files on a local system to identify sensitive information. |
PR005 | IT Ticketing System Exploration | A subject may search for, or otherwise explore an IT Ticketing System to identify sensitive information or to identify credentials or other information which may assist in pivoting to other sources of sensitive information. |
PR021 | Network Scanning | A subject conducts a scan of a network to identify additional systems, or services running on those systems. |
PR012 | Physical Disk Removal | A subject removes the physical disk of a target system to access the target file system with an external device/system. |
PR009 | Physical Exploration | A subject attempts to defeat physical security controls to gain access to a secured area to conduct an infringement. |
PR008 | Physical Item Smuggling | A subject attempts to defeat physical security controls by smuggling an item (potentially an innocent item at first) into a controlled area to facilitate an infringement (such as a smart phone with a camera). |
PR019 | Private / Incognito Browsing | Private browsing, also known as 'incognito mode' among other terms, is a feature in modern web browsers that prevents the storage of browsing history, cookies, and site data on a subject's device. When private browsing is enabled, it ensures any browsing activity conducted during the browser session is not saved to the browser history or cache.
A subject can use private browsing to conceal their actions in a web browser, such as navigating to unauthorized websites, downloading illicit materials, uploading corporate data or conducting covert communications, thus leaving minimal traces of their browsing activities on a device and frustrating forensic recovery efforts. |
PR001 | Read Windows Registry | A subject may read the Windows registry using Registry Viewer or PowerShell to help them gain more information about the system, such as keys related to security controls. |
PR006 | Security Software Enumeration | A subject attempts to identify security software or other surveillance software/services on a target system. |
PR022 | Social Engineering (Outbound) | A subject deceptively manipulates and/or persuades others in order to gain access to devices, systems or services that hold sensitive information, or to otherwise cause harm or undermine a target organization. |
PR003 | Software Installation | A subject may install or attempt to install software that will be used to exfiltrate sensitive data or contravene internal policies. |
PR010 | Software or Access Request | A subject may make a request for software (such as an RDP, SSH or FTP client) or access (such as USB mass storage device access) to be installed or enabled on a target system, to facilitate the infringement. |
PR023 | Suspicious Web Browsing | A subject engages in web searches that may indicate research or information gathering related to potential infringement or anti-forensic activities. Examples include searching for software that could facilitate data exfiltration, methods for deleting or modifying system logs, or techniques to evade security controls. Such activity could signal preparation for a potential insider event. |
PR013 | Testing Ability to Print | A subject attempts to print a document from a system to identify if this capability is permitted, restricted, or not possible. |