Common Information
Type | Value |
---|---|
Value |
Cloud Accounts - T1585.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, MEGA, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Establishing cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) Creating [Cloud Accounts](https://attack.mitre.org/techniques/T1585/003) may also require adversaries to establish [Email Accounts](https://attack.mitre.org/techniques/T1585/002) to register with the cloud provider. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2018-02-23 | 3 | NEW: Vulnerability and Assessment Scanning for Your AWS Cloud Databases | Imperva | ||
Details | Website | 2018-02-21 | 0 | Enterprise Cloud Access Apps: The Invisible Trojan Backdoor | ||
Details | Website | 2017-09-21 | 0 | It’s All Fun and Games…Until Your "Smart" Home Gets Hacked | Radware Blog | ||
Details | Website | 2017-04-21 | 1 | How Bitmovin is Doing Multi-Stage Canary Deployments with Kubernetes in the Cloud and On-Prem | ||
Details | Website | 2014-11-13 | 0 | AWS Authentication Security: Securing Keys to the Cloud | ||
Details | Website | 2014-08-15 | 1 | Hiding A Bitcoin Mining Botnet In The Cloud - Darknet - Hacking Tools, Hacker News & Cyber Security |