User Execution

Description

An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of Phishing.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable.csCloudRead-onlyHTTPSList of Launch Configuration

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Execution

Technique: User Execution

Platform: AWS

Products Required: Tenable.cs

Tenable Release Date: 2022 Q4