| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | 主机软件二进制文件妥协 |
SLOWPULSE is applied in compromised environments through modifications to legitimate Pulse Secure files.[2] |
|
| Enterprise | T1556 | .004 | 修改身份验证过程: Network Device Authentication |
SLOWPULSE can modify LDAP and two factor authentication flows by inspecting login credentials and forcing successful authentication if the provided password matches a chosen backdoor password.[1] |
| .006 | 修改身份验证过程: Multi-Factor Authentication |
SLOWPULSE can insert malicious logic to bypass RADIUS and ACE two factor authentication (2FA) flows if a designated attacker-supplied password is provided.[1] |
||
| Enterprise | T1111 | 多因素身份验证拦截 |
SLOWPULSE can log credentials on compromised Pulse Secure VPNs during the |
|
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
SLOWPULSE can write logged ACE credentials to |
| Enterprise | T1027 | 混淆文件或信息 |
SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure |
|