Common Information
Type | Value |
---|---|
Value |
Serverless - T1583.007 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them. Once acquired, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-08-08 | 0 | Leverage the AWS Sustainability Pillar to Minimize Environmental Impact | ||
Details | Website | 2023-08-07 | 0 | Cado Introducing New Varc Capability and Cloud-Focused Malware Campaigns at Black Hat USA and BSides Las Vegas 2023 - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-08-04 | 0 | AI, Security, and the Cloud, Part 4: GOOGLE CLOUD | ||
Details | Website | 2023-08-04 | 2 | Generative AI Tools Help Criminals Launch More Sophisticated Attacks | ||
Details | Website | 2023-08-03 | 1 | Cyber Briefing: 2023.08.03 | ||
Details | Website | 2023-08-03 | 0 | Automated Remediation in the Cloud: Empowering Efficiency with Cado - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-08-03 | 0 | What is CNAPP? What it Means and Why It Matters - Uptycs | ||
Details | Website | 2023-08-02 | 0 | Cado Security Labs Releases 2023 Cloud Threat Findings Report - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-08-01 | 14 | Facebook clickbait leads to money scam for users - RedPacket Security | ||
Details | Website | 2023-08-01 | 0 | Let’s talk about Azure AD on apps, data and resources | ||
Details | Website | 2023-08-01 | 0 | How to Leverage the AWS Cost Optimization Pillar | ||
Details | Website | 2023-07-31 | 2 | Wiz's agentless approach to cloud-native vulnerability management | Wiz Blog | ||
Details | Website | 2023-07-31 | 10 | Cado Security Labs Encounter Novel Malware, Redis P2Pinfect - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-07-31 | 4 | Perform continuous vulnerability scanning of AWS Lambda functions with Amazon Inspector | Amazon Web Services | ||
Details | Website | 2023-07-31 | 1 | How to receive alerts when your IAM configuration changes | Amazon Web Services | ||
Details | Website | 2023-07-30 | 10 | Experiment #3 | ||
Details | Website | 2023-07-29 | 2 | 🌐 Web Development: Building the Digital Universe 🚀💻🌐 | ||
Details | Website | 2023-07-28 | 7 | Identifying Server-Side Technologies for Web Penetration Testing Applications — 5 | 2023 | ||
Details | Website | 2023-07-27 | 1 | Zenbleed CVE-2023-20593: What you need to know about the latest CPU vulnerability | ||
Details | Website | 2023-07-27 | 0 | Fingerprint enables rapid regulatory compliance with Elastic | ||
Details | Website | 2023-07-25 | 0 | Decoding the NIST Cloud Computing Forensics Reference Architecture - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-07-25 | 0 | How to Leverage AWS Performance Efficiency Pillar | ||
Details | Website | 2023-07-24 | 1 | Streamline Software Bill of Materials (SBOM) Generation with Wiz's Agentless SBOM | Wiz Blog | ||
Details | Website | 2023-07-24 | 1 | Streamline Software Bill of Materials (SBOM) Generation with Wiz's Agentless SBOM | Wiz Blog | ||
Details | Website | 2023-07-22 | 6 | About TLS, DNS, Encryption and OPSEC concepts |