Common Information
Type | Value |
---|---|
Value |
Code Repositories - T1213.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Once adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or credentials contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe) **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1593/003), which focuses on conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043) via public code repositories. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-10-30 | 4 | CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys | ||
Details | Website | 2023-10-29 | 97 | Octo Tempest: extortion through phishing, SIM swapping and ransomware | ||
Details | Website | 2023-10-27 | 1 | Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic | ||
Details | Website | 2023-10-27 | 1 | Microsoft: Octo Tempest is one of the most dangerous financial hacking groups - RedPacket Security | ||
Details | Website | 2023-10-26 | 0 | Responding and Defending Against IdP Vendor Compromise | ||
Details | Website | 2023-10-26 | 5 | Meet Octo Tempest, 'Most Dangerous Financial' Hackers | ||
Details | Website | 2023-10-26 | 1 | Microsoft: Octo Tempest is one of the most dangerous financial hacking groups | ||
Details | Website | 2023-10-25 | 11 | Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction | Microsoft Security Blog | ||
Details | Website | 2023-10-24 | 0 | CI/CD Pipeline: Master Tool Set-Up Challenges | ||
Details | Website | 2023-10-24 | 0 | GitHub boosts secrets scanning: A necessary step, but supply chain security is key to managing risk | ||
Details | Website | 2023-10-20 | 0 | Okta says its support system was breached using stolen credentials | ||
Details | Website | 2023-10-19 | 1 | Valve Enhances Steam Security With SMS Verification | ||
Details | Website | 2023-10-18 | 0 | Elastic Global Threat Report 2023: Top cybersecurity forecasts and recommendations | ||
Details | Website | 2023-09-20 | 1 | Checkmarx Named a Leader in Static Application Security Testing (SAST) by Independent Research Firm | Checkmarx.com | ||
Details | Website | 2023-09-20 | 2 | LUCR-3: Scattered Spider Getting SaaS-y in the Cloud | ||
Details | Website | 2023-09-18 | 6 | Okta Source Code Breach: How to Evaluate the Impact & Protect your Organization | ||
Details | Website | 2023-09-18 | 0 | A 2022 Year-end Recap on Cloud Threats | ||
Details | Website | 2023-09-15 | 816 | UNC3944: SMS Phishing, SIM Swapping, and Ransomware Attacks | ||
Details | Website | 2023-09-11 | 0 | Elevating Cloud Security Response with Cloud-to-Code Tracing | ||
Details | Website | 2023-09-08 | 2 | Secure Software Implementation in OWASP SAMM | ||
Details | Website | 2023-09-04 | 0 | Evolution of Cloud Tactics, Techniques, and Procedures | SANS | ||
Details | Website | 2023-09-01 | 0 | Understanding Cybersecurity Footprinting: Techniques and Strategies | ||
Details | Website | 2023-08-31 | 0 | Cloud Detection and Response Needs To Break Down Boundaries | ||
Details | Website | 2023-08-29 | 0 | Cryptocurrency Malware: An Ever-Adapting Threat | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 |