Skip to content

Info

ID: AT-RD003.001
Technique: Obtain Capabilities
Tactic: Resource Development
Platforms: PRE
Version: 1.0

Vulnerabilities

Within the Resource Development phase, adversaries might exploit vulnerabilities as a means to Obtain Capabilities for subsequent attack operations. This involves identifying or acquiring code that takes advantage of security weaknesses in systems, applications, or services. Adversaries typically leverage these vulnerabilities to establish initial access, elevate privileges, or persist within target environments. They may discover vulnerabilities through independent research, purchase exploit code from underground markets, or repurpose publicly disclosed proof-of-concept exploits. These capabilities could target known Common Vulnerabilities and Exposures (CVEs), zero-day vulnerabilities with no available patches, or security misconfigurations that create exploitable conditions. The acquisition of vulnerability exploits represents a critical preparatory step that enables adversaries to develop a technical advantage before engaging with target systems, significantly enhancing their ability to breach defenses during later attack phases.

Data Sources

  • Vulnerability Databases: CVE databases, security advisories, and vulnerability disclosure platforms
  • Exploit Marketplaces: Underground exploit sale platforms and vulnerability broker communications
  • Application Logs: Vulnerability scanning and exploitation attempt logs
  • Threat Intelligence: Intelligence reports documenting adversary exploit acquisition and development

Detection

ID Data Source Detection
DS0042 Threat Intelligence Subscribe to dark-web crawler feeds for exploit sale advertisements containing organisation asset keywords.
DS0021 Code Repository Detect forks or pull-requests that introduce known CVE PoCs into internal testing repos.
DS0015 Application Log Correlate vulnerability-scanner API tokens running excessive unauthenticated scans against production ranges.
DS0029 Network Traffic Content Identify outbound traffic to well-known exploit databases (exploit-db, packetstorm) from build/CI environments.

Mitigations

ID Mitigation Description
M1016 Vulnerability Scanning Deploy continuous, authenticated scanning and integrate findings into risk register with SLA patch timelines.
M1051 Update Software Automate patch pipelines and virtual-patching WAF rules for zero-day coverage.
M1055 Do Not Mitigate Adopt bug-bounty disclosure program with rapid triage and reward to reduce black-market exploit sale.