Common Information
Type Value
Value
Cloud Accounts - T1585.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, MEGA, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Establishing cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) Creating [Cloud Accounts](https://attack.mitre.org/techniques/T1585/003) may also require adversaries to establish [Email Accounts](https://attack.mitre.org/techniques/T1585/002) to register with the cloud provider.
Details Published Attributes CTI Title
Details Website 2024-10-30 0 How Cybersecurity Companies in Dubai Enhance Cloud Security for Businesses
Details Website 2024-10-29 0 Evasive Panda Deploys Advanced CloudScout Malware to Steal Data from Taiwanese Institutions - CloudSEK News
Details Website 2024-10-28 0 Key Modules in the Offensive Cloud Learning Path
Details Website 2024-10-25 3 Learn Cloud Pentesting (Roadmap) and earn in $100,000—$150,000
Details Website 2024-10-23 2 Why DSPM is Essential for Achieving Data Privacy in 2024
Details Website 2024-10-22 0 LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks
Details Website 2024-10-22 0 Sysdig 2024 global threat report
Details Website 2024-10-22 0 Sysdig 2024 global threat report
Details Website 2024-10-18 27 Iranian Cyber Actors’ Brute Force and Credential Access Attacks: CISA Alert AA24-290A
Details Website 2024-10-18 8 Elevate Your Threat Hunting with Elastic — Elastic Security Labs
Details Website 2024-10-17 0 Day 17 — How Secure is Your Data in the Cloud?
Details Website 2024-10-17 1 Pitfalls of Cloud Sprawl and How to Avoid Them
Details Website 2024-10-16 7 How to Build Custom Controls in Sysdig Secure
Details Website 2024-10-16 108 Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations | CISA
Details Website 2024-10-16 7 How to Build Custom Controls in Sysdig Secure 
Details Website 2024-10-10 27 Russian SVR Exploiting Unpatched Vulnerabilities in Global Cyber Campaign
Details Website 2024-10-09 0 Cybersecurity Tip Day 3: Enable MFA and Multiple Positions to Your Routine
Details Website 2024-10-09 11 Container security best practices: Comprehensive guide
Details Website 2024-10-08 0 Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One
Details Website 2024-10-07 141 Mind the (air) gap: GoldenJackal gooses government guardrails
Details Website 2024-10-03 2 A Single Cloud Compromise Can Feed an Army of AI Sex Bots
Details Website 2024-10-03 0 Cybersecurity Spending on the Rise, But Security Leaders Still Feel Vu
Details Website 2024-10-03 2 A Single Cloud Compromise Can Feed an Army of AI Sex Bots – Krebs on Security
Details Website 2024-10-02 57 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
Details Website 2024-09-27 0 Revolutionary DDI Services for the Hybrid, Multi-Cloud Era