Common Information
Type | Value |
---|---|
Value |
Serverless - T1583.007 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them. Once acquired, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | API Hacktics: Unveiling Vulnerabilities in Modern Web APIs | ||
Details | Website | 2024-11-17 | 0 | AWS Security Essentials: Protecting Your Cloud Infrastructure | ||
Details | Website | 2024-11-15 | 5 | How Runtime Insights Help with Container Security | ||
Details | Website | 2024-11-15 | 5 | Securing AWS Lambda | How Misconfigurations Can Lead to Lateral Movement | ||
Details | Website | 2024-11-15 | 1 | How Runtime Insights Help with Container Security | ||
Details | Website | 2024-11-14 | 31 | SECURE SOFTWARE DEVELOPMENT LIFE CYCLE | ||
Details | Website | 2024-11-14 | 4 | Streamlining Security: Integrating Amazon Bedrock with Elastic — Elastic Security Labs | ||
Details | Website | 2024-11-13 | 8 | Using Azure Functions for the CyberSecurity team’s routine. | ||
Details | Website | 2024-11-13 | 1 | AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats | ||
Details | Website | 2024-11-12 | 0 | Discover duplicate AWS Config rules for streamlined compliance | Amazon Web Services | ||
Details | Website | 2024-11-12 | 0 | The Most Valuable IT Certifications to Boost Your Salary in 2025 | ||
Details | Website | 2024-11-12 | 7 | 10 Best DNS Management Tools - 2025 | ||
Details | Website | 2024-11-12 | 5 | Elasticsearch 8.16: Better Binary Quantization (BBQ) — A better way to quantize vector data over Product Quantization (PQ) and production-ready hybrid conversational search | ||
Details | Website | 2024-11-12 | 0 | Elasticsearch and Kibana 8.16: Kibana gets contextual and BBQ speed and savings! | ||
Details | Website | 2024-11-11 | 9 | Utilizando Azure Functions para a rotina da equipe de CyberSecurity. | ||
Details | Website | 2024-11-11 | 2 | Best Practices for Cybersecurity in Federal Cloud Computing | ||
Details | Website | 2024-11-11 | 5 | Jumping into Bug Bounty Automation | ||
Details | Website | 2024-11-10 | 0 | “Top 25 AWS Services” | ||
Details | Website | 2024-11-07 | 6 | Category | ||
Details | Website | 2024-11-06 | 0 | Effective Data Access Governance in the Cloud w/DSPM & CIEM | Wiz Blog | ||
Details | Website | 2024-11-06 | 0 | Managing Elasticsearch just got easier, a LOT easier. | ||
Details | Website | 2024-11-04 | 0 | The Evolving Landscape of Computer Science and Cybersecurity: Key Trends in 2024 | ||
Details | Website | 2024-11-04 | 0 | AI-Powered Remediation 2.0: Choose Your Own Remediation Path | Wiz Blog | ||
Details | Website | 2024-11-03 | 0 | Day 21 of AWS SAA Certification: What is AWS lambda and Serverless | ||
Details | Website | 2024-11-01 | 3 | NIS2-Richtlinie: Der KRITIS Leitfaden zum erweiterten Cybersicherheits-Framework der EU |