Common Information
Type Value
Value
Serverless - T1583.007
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them. Once acquired, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers)
Details Published Attributes CTI Title
Details Website 2023-09-28 2 A Socket API that works across JavaScript runtimes — announcing a WinterCG spec and Node.js implementation of connect()
Details Website 2023-09-28 1 Cloudflare Integrations Marketplace introduces three new partners: Sentry, Momento and Turso
Details Website 2023-09-28 3 D1: open beta is here
Details Website 2023-09-28 2 New Workers pricing — never pay to wait on I/O again
Details Website 2023-09-27 0 The best place on Region: Earth for inference
Details Website 2023-09-27 8 Workers AI: serverless GPU-powered inference on Cloudflare’s global network
Details Website 2023-09-27 1 Partnering with Hugging Face to make deploying AI easier and more affordable than ever 🤗
Details Website 2023-09-27 7 What AI companies are building with Cloudflare
Details Website 2023-09-25 0 Ease Your Search for Cloud Security Experts with CIRA - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-09-25 0 Cloudflare Stream Low-Latency HLS support now in Open Beta
Details Website 2023-09-21 0 mWise 2023: Cado Security Shares the Spotlight with Tech Giants - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-09-20 6 Cado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-09-20 0 The art of security chaos engineering
Details Website 2023-09-18 0 2022 Cloud (In)Security Report
Details Website 2023-09-18 0 So you’re a new CISO? Let’s navigate your first 90 days
Details Website 2023-09-15 0 Managing Escalating Risks in a Cloud Era With CIRA - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-08-31 0 Cloud Detection and Response Needs To Break Down Boundaries
Details Website 2023-08-30 4 Accenture and Aqua Partner to Empower Cloud Security
Details Website 2023-08-30 0 Colocation Migration—How to On-Ramp to the Cloud Without Crashing | NETSCOUT
Details Website 2023-08-23 1 Innovating Cloud Security: Why Aqua Leads in Gigaom CSPM Radar
Details Website 2023-08-09 0 Cloud Security: Ensuring Data Protection in the Cloud
Details Website 2023-08-09 6 Asia Pacific Web Application Firewall (WAF) Solutions Report 2023-2027: AI and ML Enhancing Web Application Security Potential
Details Website 2023-08-09 1 Creating a Comprehensive Lesson Plan: Cybersecurity, Cloud Computing, and Backend Engineering with…
Details Website 2023-08-09 0 Supercharging Investigations With Cado’s New Timeline  - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-08-09 0 IoT Monitoring: Protecting & Maintaining IoT Devices in 2023