Common Information
Type | Value |
---|---|
Value |
Web Service - T1481 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2024-11-15 | 0 | Active Directory Certificate Services— Part 1 | ||
Details | Website | 2024-11-14 | 0 | Cloud Ransomware Flexes Fresh Scripts Against Web Apps | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 10 | The State of Cloud Ransomware in 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 10 | The State of Cloud Ransomware in 2024 | ||
Details | Website | 2024-11-13 | 24 | Lessons from a Honeypot with US Citizens’ Data | ||
Details | Website | 2024-11-13 | 6 | Cracking Cybersploit2 CTF: A Step-by-Step Guide to Root Access | ||
Details | Website | 2024-11-11 | 12 | Hack The Box : Tier 1 Starting Point -Responder | ||
Details | Website | 2024-11-08 | 18 | HTBAcademy-Footprinting-IMAP/POP3 | ||
Details | Website | 2024-11-08 | 35 | Life on a crooked RedLine: Analyzing the infamous infostealer’s backend | ||
Details | Website | 2024-11-07 | 9 | Dark Web Profile: KillSec - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-11-07 | 11 | Dark Web Profile: KillSec | ||
Details | Website | 2024-11-06 | 44 | GodFather Malware Targets 500 Banking & Crypto Apps Worldwide | ||
Details | Website | 2024-11-05 | 0 | Implement effective data authorization mechanisms to secure your data used in generative AI applications | Amazon Web Services | ||
Details | Website | 2024-11-04 | 35 | G700 : The Next Generation of Craxs RAT - CYFIRMA | ||
Details | Website | 2024-10-31 | 69 | Comprehensive Bug Bounty Hunting Methodology (2024 Edition) | ||
Details | Website | 2024-10-31 | 18 | NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities | ||
Details | Website | 2024-10-31 | 0 | UnitedHealth Hires Longtime Cybersecurity Executive as CISO | ||
Details | Website | 2024-10-31 | 18 | NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities | ||
Details | Website | 2024-10-29 | 9 | CVE-2024-6678: GitLab Authentication Bypass Vulnerability | ||
Details | Website | 2024-10-28 | 1185 | US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security | ||
Details | Website | 2024-10-28 | 54 | When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - MDSec | ||
Details | Website | 2024-10-28 | 28 | Katz and Mouse Game: MaaS Infostealers Adapt to Patched Chrome Defenses — Elastic Security Labs | ||
Details | Website | 2024-10-27 | 0 | Using AI and YARA | ||
Details | Website | 2024-10-26 | 22 | CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities |