Common Information
Type | Value |
---|---|
Value |
Cloud API - T1059.009 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse cloud APIs to execute malicious commands. APIs available in cloud environments provide various functionalities and are a feature-rich method for programmatic access to nearly all aspects of a tenant. These APIs may be utilized through various methods such as command line interpreters (CLIs), in-browser Cloud Shells, [PowerShell](https://attack.mitre.org/techniques/T1059/001) modules like Azure for PowerShell(Citation: Microsoft - Azure PowerShell), or software developer kits (SDKs) available for languages such as [Python](https://attack.mitre.org/techniques/T1059/006). Cloud API functionality may allow for administrative access across all major services in a tenant such as compute, storage, identity and access management (IAM), networking, and security policies. With proper permissions (often via use of credentials such as [Application Access Token](https://attack.mitre.org/techniques/T1550/001) and [Web Session Cookie](https://attack.mitre.org/techniques/T1550/004)), adversaries may abuse cloud APIs to invoke various functions that execute malicious actions. For example, CLI and PowerShell functionality may be accessed through binaries installed on cloud-hosted or on-premises hosts or accessed through a browser-based cloud shell offered by many cloud platforms (such as AWS, Azure, and GCP). These cloud shells are often a packaged unified environment to use CLI and/or scripting modules hosted as a container in the cloud environment. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-10-24 | 0 | Driving API Security Forward: Protecting Vehicle-to-Cloud Communications | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-08-01 | 0 | Optimize Your Enterprise with Trinzic X6 DDI Appliances | NIOS 9.0.1 | Infoblox | ||
Details | Website | 2023-06-27 | 5 | Enhancing Security Operations: IBM Security QRadar SOAR and RST Cloud Threat Intelligence | ||
Details | Website | 2023-06-20 | 0 | Drawing lines in the cloud: A new era for MDR - Red Canary | ||
Details | Website | 2023-06-06 | 5 | Enhancing Network Security: Integrating Threat Intelligence with Palo Alto NGFW | ||
Details | Website | 2023-05-30 | 37 | Technical Advisory – Multiple Vulnerabilities in Faronics Insight (CVE-2023-28344, CVE-2023-28345, CVE-2023-28346, CVE-2023-28347, CVE-2023-28348, CVE-2023-28349, CVE-2023-28350, CVE-2023-28351, CVE-2023-28352, CVE-2023-28353) | ||
Details | Website | 2023-05-29 | 0 | How Apigee can help government agencies adopt Zero Trust Architecture | ||
Details | Website | 2023-05-22 | 54 | Permiso | Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor | ||
Details | Website | 2023-05-17 | 2 | Challenge Accepted: RSA Highlights | Arctic Wolf | ||
Details | Website | 2023-05-10 | 0 | Why Honeytokens Are the Future of Intrusion Detection - RedPacket Security | ||
Details | Website | 2023-05-10 | 0 | Why Honeytokens Are the Future of Intrusion Detection | ||
Details | Website | 2023-05-01 | 84 | Chain Reaction: ROKRAT’s Missing Link - Check Point Research | ||
Details | Website | 2023-04-20 | 0 | Cloud Agnostic or Devout | Terraform | Brandon Evans | SANS Institute | ||
Details | Website | 2023-04-20 | 481 | ATT&CK Changes | ||
Details | Website | 2023-04-03 | 23 | How to monitor Kafka and Confluent Cloud with Elastic Observability | ||
Details | Website | 2023-03-22 | 0 | CNAPP: Gartner® Market Guide for 2023 - 6 Key Takeaways | ||
Details | Website | 2022-12-19 | 595 | Blog | ||
Details | Website | 2022-12-13 | 0 | Know your enemy:A look at 4 common attack paths | ||
Details | Website | 2022-07-22 | 5 | Cloud Identity API | Google Cloud | ||
Details | Website | 2022-07-14 | 12 | Abusing Duo Authentication Misconfigurations in Windows & AD | ||
Details | Website | 2022-04-21 | 145 | TeamTNT targeting AWS, Alibaba | ||
Details | Website | 2022-03-29 | 0 | Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously | ||
Details | Website | 2022-03-29 | 0 | Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously | ||
Details | Website | 2021-10-18 | 498 | Vulnerability Summary for the Week of October 11, 2021 | CISA |