Common Information
Type | Value |
---|---|
Value |
Code Repositories - T1593.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search public code repositories for information about victims that can be used during targeting. Victims may store code in repositories on various third-party websites such as GitHub, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Adversaries may search various public code repositories for various information about a victim. Public code repositories can often be a source of various general information about victims, such as commonly used programming languages and libraries as well as the names of employees. Adversaries may also identify more sensitive data, including accidentally leaked credentials or API keys.(Citation: GitHub Cloud Service Credentials) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Valid Accounts](https://attack.mitre.org/techniques/T1078) or [Phishing](https://attack.mitre.org/techniques/T1566)). **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1213/003), which focuses on [Collection](https://attack.mitre.org/tactics/TA0009) from private and internally hosted code repositories. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-03-25 | 17 | Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments | ||
Details | Website | 2024-03-11 | 1 | APT29 gains access to Microsoft systems and source code | ||
Details | Website | 2024-02-07 | 1 | Cloudy with a chance of threats: Advice for mitigating the top cyber threats of 2024 | ||
Details | Website | 2024-01-11 | 5 | Ransomware in the cloud | ||
Details | Website | 2023-12-20 | 0 | The rise of credential and identity attacks: Why they’re disruptive, devastating, and deceptively simple | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-12-04 | 0 | Recapping Wiz @at Re:Invent 2023 | Wiz Blog | ||
Details | Website | 2023-11-27 | 0 | Extend Wiz to your Developers: Enable secure cloud development with agility | Wiz Blog | ||
Details | Website | 2023-11-17 | 46 | Scattered Spider: Leveraging Social Engineering for Extortion - CISA Alert AA23-320A | ||
Details | Website | 2023-11-17 | 2 | Implement an early feedback loop with AWS developer tools to shift security left | Amazon Web Services | ||
Details | Website | 2023-11-16 | 0 | Automate and enhance your code security with AI-powered services | Amazon Web Services | ||
Details | Website | 2023-11-14 | 0 | Introducing a new approach to code security | ||
Details | Website | 2023-11-13 | 12 | Rewterz Threat Alert – Discovery of BlazeStealer Malware Within Python Packages on PyPI – Active IOCs | ||
Details | Website | 2023-11-09 | 2 | Why Identity Providers Aren't Enough To Secure Identities In The Cloud - Part Two | ||
Details | Website | 2023-11-09 | 7 | Memory scanning leaves attackers nowhere to hide | ||
Details | Website | 2023-11-09 | 1 | Software Supply Chain Security Solution - Supply Chain Security Control - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. | ||
Details | Website | 2023-11-08 | 3 | Software Supply Chain Security Solution – Supply Chain Security Control | ||
Details | Website | 2023-11-06 | 3 | Microsoft Scattered Spider Warning: Ransomware Alert | ||
Details | Website | 2023-11-04 | 0 | Okta breach: 134 customers exposed in October support system hack - RedPacket Security | ||
Details | Website | 2023-11-03 | 0 | Okta breach: 134 customers exposed in support system hack | ||
Details | Website | 2023-11-03 | 0 | Okta breach: 134 customers exposed in October support system hack | ||
Details | Website | 2023-11-01 | 0 | The Rise of ‘Malware Meal Kits’: A New Threat Campaign Uncovered by HP | ||
Details | Website | 2023-10-31 | 0 | HP Wolf Security Threat Insights Report Q3 2023 | HP Wolf Security | ||
Details | Website | 2023-10-30 | 0 | Applying ATT&CK Methodology to Hardware and Firmware - Eclypsium | Supply Chain Security for the Modern Enterprise | ||
Details | Website | 2023-10-30 | 0 | How to Utilize Attack Surface Management and Vulnerability Intelligence for ‘Vulnerability Mapping’ |