Common Information
Type | Value |
---|---|
Value |
Cloud Services - T1021.007 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log into accessible cloud services within a compromised environment using [Valid Accounts](https://attack.mitre.org/techniques/T1078) that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user. Many enterprises federate centrally managed user identities to cloud services, allowing users to login with their domain credentials in order to access the cloud control plane. Similarly, adversaries may connect to available cloud services through the web console or through the cloud command line interface (CLI) (e.g., [Cloud API](https://attack.mitre.org/techniques/T1059/009)), using commands such as <code>Connect-AZAccount</code> for Azure PowerShell, <code>Connect-MgGraph</code> for Microsoft Graph PowerShell, and <code>gcloud auth login</code> for the Google Cloud CLI. In some cases, adversaries may be able to authenticate to these services via [Application Access Token](https://attack.mitre.org/techniques/T1550/001) instead of a username and password. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 1 | Compare Easy-to-use VPN Services | ||
Details | Website | 2024-11-17 | 0 | From Detection to Response: The Power of XDR in Cybersecurity | ||
Details | Website | 2024-11-17 | 2 | 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders | ||
Details | Website | 2024-11-17 | 0 | Ransomware Groups Exploit Cloud Services for Data Exfiltration and Attacks - RedPacket Security | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for | ||
Details | Website | 2024-11-16 | 0 | OWASP API Security 2024: Safeguarding the Digital Ecosystem | ||
Details | Website | 2024-11-16 | 0 | Migrating Payment Infrastructure on GCP — Payment HSM | ||
Details | Website | 2024-11-15 | 0 | Case Studies: Successful Implementations of XDR | ||
Details | Website | 2024-11-15 | 0 | Cloud services are becoming a ransomware hotspot | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Introduction: The Evolving Landscape of Cybersecurity | ||
Details | Website | 2024-11-15 | 2 | Insider Threats: The Security Risk That’s Already Inside Your Business | ||
Details | Website | 2024-11-15 | 0 | The Rising Threat of Cloud Ransomware: A Global Concern for Businesses of All Sizes - Cybersecurity Insiders | ||
Details | Website | 2024-11-15 | 0 | Ransomware Groups Use Cloud Services For Data Exfiltration | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Ransomware Groups Use Cloud Services For Data Exfiltration | ||
Details | Website | 2024-11-15 | 0 | Beyond the breach: How cloud ransomware is redefining cyber threats in 2024 - CRN | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Understanding Cybersecurity: Its Importance in Today’s Digital Era | ||
Details | Website | 2024-11-15 | 12 | Ivanti Cloud Services Appliance Hacked! | CVE-20248963 | Live Bug | ||
Details | Website | 2024-11-15 | 0 | Why IT Security Solutions in India Are Vital for Small and Medium Businesses | ||
Details | Website | 2024-11-14 | 0 | Cloud Ransomware Flexes Fresh Scripts Against Web Apps | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 0 | SambaNova Systems delivers enterprise AI transformation with Juniper Networks as the network foundation | Official Juniper Networks Blogs | ||
Details | Website | 2024-11-14 | 0 | Understanding the Risks and Mitigation of Data Leakage | ||
Details | Website | 2024-11-14 | 10 | The State of Cloud Ransomware in 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 24 | Major cyber attacks and data breaches of 2024 | ||
Details | Website | 2024-11-14 | 0 | Fortifying Your Digital Fortress: A Guide to Network Security for Small Businesses | ||
Details | Website | 2024-11-14 | 2 | Google to Issue CVEs for Critical Cloud Vulnerabilities |