Common Information
Type Value
Value
Cloud Services - T1021.007
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may log into accessible cloud services within a compromised environment using [Valid Accounts](https://attack.mitre.org/techniques/T1078) that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user. Many enterprises federate centrally managed user identities to cloud services, allowing users to login with their domain credentials in order to access the cloud control plane. Similarly, adversaries may connect to available cloud services through the web console or through the cloud command line interface (CLI) (e.g., [Cloud API](https://attack.mitre.org/techniques/T1059/009)), using commands such as <code>Connect-AZAccount</code> for Azure PowerShell, <code>Connect-MgGraph</code> for Microsoft Graph PowerShell, and <code>gcloud auth login</code> for the Google Cloud CLI. In some cases, adversaries may be able to authenticate to these services via [Application Access Token](https://attack.mitre.org/techniques/T1550/001) instead of a username and password.
Details Published Attributes CTI Title
Details Website 2024-11-17 1 Compare Easy-to-use VPN Services
Details Website 2024-11-17 0 From Detection to Response: The Power of XDR in Cybersecurity
Details Website 2024-11-17 2 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders
Details Website 2024-11-17 0 Ransomware Groups Exploit Cloud Services for Data Exfiltration and Attacks - RedPacket Security
Details Website 2024-11-16 0 Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for
Details Website 2024-11-16 0 OWASP API Security 2024: Safeguarding the Digital Ecosystem
Details Website 2024-11-16 0 Migrating Payment Infrastructure on GCP — Payment HSM
Details Website 2024-11-15 0 Case Studies: Successful Implementations of XDR
Details Website 2024-11-15 0 Cloud services are becoming a ransomware hotspot | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 0 Introduction: The Evolving Landscape of Cybersecurity
Details Website 2024-11-15 2 Insider Threats: The Security Risk That’s Already Inside Your Business
Details Website 2024-11-15 0 The Rising Threat of Cloud Ransomware: A Global Concern for Businesses of All Sizes - Cybersecurity Insiders
Details Website 2024-11-15 0 Ransomware Groups Use Cloud Services For Data Exfiltration | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 0 Ransomware Groups Use Cloud Services For Data Exfiltration
Details Website 2024-11-15 0 Beyond the breach: How cloud ransomware is redefining cyber threats in 2024 - CRN | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 0 Understanding Cybersecurity: Its Importance in Today’s Digital Era
Details Website 2024-11-15 12 Ivanti Cloud Services Appliance Hacked! | CVE-20248963 | Live Bug
Details Website 2024-11-15 0 Why IT Security Solutions in India Are Vital for Small and Medium Businesses
Details Website 2024-11-14 0 Cloud Ransomware Flexes Fresh Scripts Against Web Apps | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 0 SambaNova Systems delivers enterprise AI transformation with Juniper Networks as the network foundation | Official Juniper Networks Blogs
Details Website 2024-11-14 0 Understanding the Risks and Mitigation of Data Leakage
Details Website 2024-11-14 10 The State of Cloud Ransomware in 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-14 0 Fortifying Your Digital Fortress: A Guide to Network Security for Small Businesses
Details Website 2024-11-14 2 Google to Issue CVEs for Critical Cloud Vulnerabilities