Common Information
Type Value
Value
Cloud Accounts - T1078.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. Cloud Accounts can exist solely in the cloud; alternatively, they may be hybrid-joined between on-premises systems and the cloud through syncing or federation with other identity sources such as Windows Active Directory. (Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation) Service or user accounts may be targeted by adversaries through [Brute Force](https://attack.mitre.org/techniques/T1110), [Phishing](https://attack.mitre.org/techniques/T1566), or various other means to gain access to the environment. Federated or synced accounts may be a pathway for the adversary to affect both on-premises systems and cloud environments - for example, by leveraging shared credentials to log onto [Remote Services](https://attack.mitre.org/techniques/T1021). High privileged cloud accounts, whether federated, synced, or cloud-only, may also allow pivoting to on-premises environments by leveraging SaaS-based [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) to run commands on hybrid-joined devices. An adversary may create long lasting [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) on a compromised cloud account to maintain persistence in the environment. Such credentials may also be used to bypass security controls such as multi-factor authentication. Cloud accounts may also be able to assume [Temporary Elevated Cloud Access](https://attack.mitre.org/techniques/T1548/005) or other privileges through various means within the environment. Misconfigurations in role assignments or role assumption policies may allow an adversary to use these mechanisms to leverage permissions outside the intended scope of the account. Such over privileged accounts may be used to harvest sensitive data from online storage accounts and databases through [Cloud API](https://attack.mitre.org/techniques/T1059/009) or other methods.
Details Published Attributes CTI Title
Details Website 2024-10-30 0 How Cybersecurity Companies in Dubai Enhance Cloud Security for Businesses
Details Website 2024-10-29 0 Evasive Panda Deploys Advanced CloudScout Malware to Steal Data from Taiwanese Institutions - CloudSEK News
Details Website 2024-10-28 0 Key Modules in the Offensive Cloud Learning Path
Details Website 2024-10-25 3 Learn Cloud Pentesting (Roadmap) and earn in $100,000—$150,000
Details Website 2024-10-23 2 Why DSPM is Essential for Achieving Data Privacy in 2024
Details Website 2024-10-22 0 LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks
Details Website 2024-10-22 0 Sysdig 2024 global threat report
Details Website 2024-10-22 0 Sysdig 2024 global threat report
Details Website 2024-10-18 27 Iranian Cyber Actors’ Brute Force and Credential Access Attacks: CISA Alert AA24-290A
Details Website 2024-10-18 8 Elevate Your Threat Hunting with Elastic — Elastic Security Labs
Details Website 2024-10-17 0 Day 17 — How Secure is Your Data in the Cloud?
Details Website 2024-10-17 1 Pitfalls of Cloud Sprawl and How to Avoid Them
Details Website 2024-10-16 7 How to Build Custom Controls in Sysdig Secure
Details Website 2024-10-16 108 Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations | CISA
Details Website 2024-10-16 7 How to Build Custom Controls in Sysdig Secure 
Details Website 2024-10-10 27 Russian SVR Exploiting Unpatched Vulnerabilities in Global Cyber Campaign
Details Website 2024-10-09 0 Cybersecurity Tip Day 3: Enable MFA and Multiple Positions to Your Routine
Details Website 2024-10-09 11 Container security best practices: Comprehensive guide
Details Website 2024-10-08 0 Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One
Details Website 2024-10-07 141 Mind the (air) gap: GoldenJackal gooses government guardrails
Details Website 2024-10-03 2 A Single Cloud Compromise Can Feed an Army of AI Sex Bots
Details Website 2024-10-03 0 Cybersecurity Spending on the Rise, But Security Leaders Still Feel Vu
Details Website 2024-10-03 2 A Single Cloud Compromise Can Feed an Army of AI Sex Bots – Krebs on Security
Details Website 2024-10-02 57 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
Details Website 2024-09-27 0 Revolutionary DDI Services for the Hybrid, Multi-Cloud Era