{"description": "Enterprise techniques used by MEDUSA, ATT&CK software S1220 (v1.0)", "name": "MEDUSA (S1220)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "19", "navigator": "5.3.2"}, "techniques": [{"techniqueID": "T1574", "showSubtechniques": true}, {"techniqueID": "T1574.006", "comment": "[MEDUSA](https://attack.mitre.org/software/S1220) can execute code through dynamic linker hijacking of  the `LD_PRELOAD` library.(Citation: Google Cloud Mandiant UNC3886 2024)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1027", "showSubtechniques": true}, {"techniqueID": "T1027.013", "comment": "[MEDUSA](https://attack.mitre.org/software/S1220) can XOR encrypt configuration strings.(Citation: Google Cloud Mandiant UNC3886 2024)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1563", "showSubtechniques": true}, {"techniqueID": "T1563.001", "comment": "[MEDUSA](https://attack.mitre.org/software/S1220) can be configured to capture SSH credentials via SSH hijacking.(Citation: Google Cloud Mandiant UNC3886 2024)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1014", "comment": "[MEDUSA](https://attack.mitre.org/software/S1220) is a rootkit with command execution and credential logging capabilities.(Citation: Google Cloud Mandiant UNC3886 2024)\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by MEDUSA", "color": "#66b1ff"}]}