Common Information
Type Value
Value
Cloud Accounts - T1078.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. Cloud Accounts can exist solely in the cloud; alternatively, they may be hybrid-joined between on-premises systems and the cloud through syncing or federation with other identity sources such as Windows Active Directory. (Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation) Service or user accounts may be targeted by adversaries through [Brute Force](https://attack.mitre.org/techniques/T1110), [Phishing](https://attack.mitre.org/techniques/T1566), or various other means to gain access to the environment. Federated or synced accounts may be a pathway for the adversary to affect both on-premises systems and cloud environments - for example, by leveraging shared credentials to log onto [Remote Services](https://attack.mitre.org/techniques/T1021). High privileged cloud accounts, whether federated, synced, or cloud-only, may also allow pivoting to on-premises environments by leveraging SaaS-based [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) to run commands on hybrid-joined devices. An adversary may create long lasting [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) on a compromised cloud account to maintain persistence in the environment. Such credentials may also be used to bypass security controls such as multi-factor authentication. Cloud accounts may also be able to assume [Temporary Elevated Cloud Access](https://attack.mitre.org/techniques/T1548/005) or other privileges through various means within the environment. Misconfigurations in role assignments or role assumption policies may allow an adversary to use these mechanisms to leverage permissions outside the intended scope of the account. Such over privileged accounts may be used to harvest sensitive data from online storage accounts and databases through [Cloud API](https://attack.mitre.org/techniques/T1059/009) or other methods.
Details Published Attributes CTI Title
Details Website 2023-06-28 3 Phishing – It’s Not About Malware (Or Even Email)
Details Website 2023-06-22 0 Certificate Cloud Security Knowledge (CCSK)
Details Website 2023-06-15 5 INFORMATION BREACH PREVENTION STRATEGIES IN REMOTE TEAMS
Details Website 2023-06-08 0 Google puts $1M behind its mining-malware detection promise
Details Website 2023-06-07 5 Threat Hunting for Business Email Compromise Through User Agents
Details Website 2023-06-06 0 Google Workspace Users Can Now Go Password-Free With Passkeys
Details Website 2023-06-06 0 Google Workspace Gets Passkey Authentication
Details Website 2023-05-30 112 Russia/Ukraine Update - May 2023
Details Website 2023-05-24 0 Understanding cloud security & why it's crucial for your business
Details Website 2023-05-24 0 Welcoming all users! Elastic expands Knowledge Center and Support Hub
Details Website 2023-05-22 54 Permiso | Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor
Details Website 2023-05-17 0 How MSPs can level up their managed security service
Details Website 2023-05-17 1 Threat actor bypasses detection, protections in Microsoft Azure Serial Console
Details Website 2023-05-16 0 Conquer Cloud Security Risk: Introducing Real-Time CSPM
Details Website 2023-05-16 0 Microsoft can open and scan password-protected Zip archives in the cloud
Details Website 2023-05-16 17 SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack | Mandiant
Details Website 2023-05-15 0 Cloud Security: The Key to Unlocking the Full Potential of the Cloud
Details Website 2023-05-09 0 Domain-Protect - OWASP Domain Protect - Prevent Subdomain Takeover - RedPacket Security
Details Website 2023-05-03 0 Payment software giant AvidXchange suffers its second ransomware attack of 2023
Details Website 2023-05-03 0 Cybersecurity in the Cloud: Challenges and Solutions
Details Website 2023-05-03 0 Finally, a reason for your developers to want an agent
Details Website 2023-04-24 0 Cloud Security Management: CSPM vs. CWPP vs. CIEM vs. CNAPP
Details Website 2023-04-20 56 Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity
Details Website 2023-04-20 65 Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity
Details Website 2023-04-20 481 ATT&CK Changes