Common Information
Type | Value |
---|---|
Value |
Web Service - T1481 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-10-16 | 16 | Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign | ||
Details | Website | 2023-10-12 | 25 | CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations | ||
Details | Website | 2023-10-12 | 0 | SSL Certificate Replacement Guide for NSFOCUS ADSM and Portal - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. | ||
Details | Website | 2023-10-05 | 6 | APT Profile: Dark Pink APT Group | ||
Details | Website | 2023-10-04 | 0 | Validate IAM policies with Access Analyzer using AWS Config rules | Amazon Web Services | ||
Details | Website | 2023-10-03 | 2 | The Benefits of a Cloud Security Network Architecture Review | ||
Details | Website | 2023-10-03 | 94 | Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement | Microsoft Security Blog | ||
Details | Website | 2023-09-27 | 0 | AWS achieves QI2/QC2 qualification to host critical data and workloads from the Italian Public Administration | Amazon Web Services | ||
Details | Website | 2023-09-22 | 56 | Examining the Activities of the Turla APT Group | ||
Details | Website | 2023-09-22 | 57 | Examining the Activities of the Turla APT Group | ||
Details | Website | 2023-09-21 | 21 | Multiple Command and Control (C2) Frameworks During Red Team Engagements | ||
Details | Website | 2023-09-19 | 0 | Cato: The Rise of the Next-Generation Networking and Security Platform | ||
Details | Website | 2023-09-17 | 36 | RedLine Stealer : A new variant surfaces, Deploying using Batch Script - CYFIRMA | ||
Details | Website | 2023-09-14 | 8 | UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety | Mandiant | ||
Details | Website | 2023-09-02 | 3 | NVD - CVE-2023-39979 | ||
Details | Website | 2023-08-30 | 1 | Changelog: www.shodan.io | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-08-23 | 3 | ZDI-23-1168 | ||
Details | Website | 2023-08-22 | 3 | NVD - CVE-2021-35309 | ||
Details | Website | 2023-08-12 | 13 | Hack The Box Write-Up #1 — Lame | ||
Details | Website | 2023-08-11 | 40 | Critical Vulnerabilities Affecting Prioritized Software and Services in July 2023 | ||
Details | Website | 2023-08-10 | 12 | Attacker combines phone, email lures into believable, complex attack chain | ||
Details | Website | 2023-08-09 | 2 | What Is Data Leakage? | ||
Details | Website | 2023-08-07 | 7 | The Rise of Human-Based Botnets: Unconventional Threats in Cyberspace | ||
Details | Website | 2023-08-07 | 621 | Vulnerability Summary for the Week of July 31, 2023 | CISA |