Common Information
Type | Value |
---|---|
Value |
Cloud API - T1059.009 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse cloud APIs to execute malicious commands. APIs available in cloud environments provide various functionalities and are a feature-rich method for programmatic access to nearly all aspects of a tenant. These APIs may be utilized through various methods such as command line interpreters (CLIs), in-browser Cloud Shells, [PowerShell](https://attack.mitre.org/techniques/T1059/001) modules like Azure for PowerShell(Citation: Microsoft - Azure PowerShell), or software developer kits (SDKs) available for languages such as [Python](https://attack.mitre.org/techniques/T1059/006). Cloud API functionality may allow for administrative access across all major services in a tenant such as compute, storage, identity and access management (IAM), networking, and security policies. With proper permissions (often via use of credentials such as [Application Access Token](https://attack.mitre.org/techniques/T1550/001) and [Web Session Cookie](https://attack.mitre.org/techniques/T1550/004)), adversaries may abuse cloud APIs to invoke various functions that execute malicious actions. For example, CLI and PowerShell functionality may be accessed through binaries installed on cloud-hosted or on-premises hosts or accessed through a browser-based cloud shell offered by many cloud platforms (such as AWS, Azure, and GCP). These cloud shells are often a packaged unified environment to use CLI and/or scripting modules hosted as a container in the cloud environment. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 11 | Cyber attacks in Robotics: Risk and Prevention | ||
Details | Website | 2024-11-14 | 0 | Overcoming Kubernetes Log Challenges in Detection | Wiz Blog | ||
Details | Website | 2024-11-14 | 3 | Advanced Bot Protection You Must Know | ||
Details | Website | 2024-11-13 | 3 | Advanced Bot Protection You Must Know | ||
Details | Website | 2024-11-07 | 0 | Permiso Releases Suite of Open-Source Tools to Bolster Detection Capabilities for Past,Present and Future Attacks | ||
Details | Website | 2024-11-07 | 0 | Permiso Adds Three More Open Source Cybersecurity Tools | ||
Details | Website | 2024-11-06 | 0 | INTRODUCING CAPICHE DETECTION FRAMEWORK: AN OPEN-SOURCE TOOL TO SIMPLIFY CLOUD API-BASED HUNTING | ||
Details | Website | 2024-11-04 | 0 | 5 Must-See Sessions at KubeCon North America | ||
Details | Website | 2024-10-27 | 5 | A Deep Dive into Advanced Cloud Security Threats | ||
Details | Website | 2024-10-25 | 11 | How to use Google Cloud API integration in Google SecOps | ||
Details | Website | 2024-10-16 | 8 | SecAI Unveils Dual Intelligence-Powered Cybersecurity | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-15 | 3 | Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems - CyberSRC | ||
Details | Website | 2024-10-08 | 0 | Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One | ||
Details | Website | 2024-10-01 | 0 | The Rise of Cloud-Native Security | ||
Details | Website | 2024-09-26 | 3 | Advancements in AI: Quite a Leg Up for Cybersecurity (82% of data breaches involve human error!) | ||
Details | Website | 2024-09-25 | 1 | New integration: Nebula and OneView with Google Chronicle SIEM - ThreatDown by Malwarebytes | ||
Details | Website | 2024-09-21 | 4 | More for Less — Securing with HELK | ||
Details | Website | 2024-09-20 | 0 | Synergizing Cybersecurity: The Benefits of Technology Alliances | ||
Details | Website | 2024-08-07 | 41 | Cloud Cover: How Malicious Actors Are Leveraging Cloud Services | ||
Details | Website | 2024-07-04 | 4 | How Cloud Migration is Affecting AppSec - A Red Teamer's Perspective | JUMPSEC LABS | ||
Details | Website | 2024-06-20 | 78 | 我们需要从JS文件里提取哪些信息? | ||
Details | Website | 2024-06-04 | 0 | CISOs Navigating the GenAI Tide: Actionable Insights from SANS Institute | ||
Details | Website | 2024-03-18 | 10 | Application consent attacks: Patterns, detection, and mitigation | ||
Details | Website | 2024-02-09 | 6 | New attack vectors emerge via recent EKS updates | Wiz Blog | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 |