Common Information
Type | Value |
---|---|
Value |
Cloud Accounts - T1585.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, MEGA, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Establishing cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) Creating [Cloud Accounts](https://attack.mitre.org/techniques/T1585/003) may also require adversaries to establish [Email Accounts](https://attack.mitre.org/techniques/T1585/002) to register with the cloud provider. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 24 | Major cyber attacks and data breaches of 2024 | ||
Details | Website | 2024-11-13 | 3 | Top challenges for implementing multi-domain correlation in the cloud | ||
Details | Website | 2024-11-13 | 1 | Top challenges for implementing multi-domain correlation in the cloud | ||
Details | Website | 2024-11-12 | 4 | Hunting for Account Takeovers in Office 365 Logs | ||
Details | Website | 2024-11-12 | 0 | Cloud Data Security: How to Get it Right? | ||
Details | Website | 2024-11-12 | 0 | The Problem: Using One Email for Everything | ||
Details | Website | 2024-11-12 | 5 | Report Shows Ransomware Has Grown 41% for Construction Industry - ReliaQuest | ||
Details | Website | 2024-11-12 | 0 | Elastic Security 8.16: Elastic AI Assistant updates and contextualized cloud detection and response | ||
Details | Website | 2024-11-08 | 0 | Google To Make MFA Mandatory for Google Cloud in 2025 | ||
Details | Website | 2024-11-07 | 1 | Google Cloud to make MFA mandatory by the end of 2025 | ||
Details | Website | 2024-11-07 | 0 | Google Cloud makes MFA mandatory for all global users by 2025 - Cybersecurity Insiders | ||
Details | Website | 2024-11-07 | 2 | Runtime security in multi-cloud environments: best practices and importance | ||
Details | Website | 2024-11-07 | 0 | Mandatory Multifactor Authentication for Google Cloud Users by 2025 - RedPacket Security | ||
Details | Website | 2024-11-07 | 1 | Google’s New Security Mandate: MFA to be Mandatory on All Google Cloud Accounts by 2025 | ||
Details | Website | 2024-11-07 | 6 | Category | ||
Details | Website | 2024-11-06 | 0 | Google Cloud: MFA Will Be Mandatory for All Users in 2025 | ||
Details | Website | 2024-11-06 | 0 | GZR Observer Daily — Nov 6, 2024 | ||
Details | Website | 2024-11-06 | 0 | CloudCheckr Unveiled: Comprehensive Guide to Cloud Cost Management, Security, and Compliance… | ||
Details | Website | 2024-11-06 | 0 | Google Cloud to Mandate Multifactor Authentication by 2025 | ||
Details | Website | 2024-11-06 | 1 | Google Cloud to make MFA mandatory by the end of 2025 | ||
Details | Website | 2024-11-05 | 5 | Mastering Cloud Security Audit: Step-by-Step with Scout Suite | ||
Details | Website | 2024-11-05 | 4 | The Credential Abuse Cycle: Theft, Trade, and Exploitation - ReliaQuest | ||
Details | Website | 2024-10-31 | 2 | The Latest in Cybersecurity: Recent Vulnerabilities and Breaches to Watch | ||
Details | Website | 2024-10-31 | 4 | Moving Baselime from AWS to Cloudflare: simpler architecture, improved performance, over 80% lower cloud costs |