Common Information
Type | Value |
---|---|
Value |
CDNs - T1596.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a distributed, load balanced array of servers. CDNs may also allow organizations to customize content delivery based on the requestor’s geographical region. Adversaries may search CDN data to gather actionable information. Threat actors can use online resources and lookup tools to harvest information about content servers within a CDN. Adversaries may also seek and target CDN misconfigurations that leak sensitive information not intended to be hosted and/or do not have the same protection mechanisms (ex: login portals) as the content hosted on the organization’s website.(Citation: DigitalShadows CDN) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-15 | 1 | Chinese SilkSpecter Hackers Attacking Black Friday Shoppers | ||
Details | Website | 2024-11-12 | 16 | LummaStealer Lab CyberDefenders |Writeup | ||
Details | Website | 2024-11-12 | 7 | 10 Best DNS Management Tools - 2025 | ||
Details | Website | 2024-11-12 | 0 | 2025 Global State of API Security Report - New Data Shows API Breaches Continue to Rise Due to Fraud, Bot Attacks, and GenAI Risks - Cybersecurity Insiders | ||
Details | Website | 2024-11-11 | 0 | Unmasking E-Commerce Security Threats: What You Must Know | ||
Details | Website | 2024-11-05 | 0 | Die NIS2-Sektordefinitionen: Ein umfassender Leitfaden für Unternehmen und Organisationen | ||
Details | Website | 2024-11-04 | 0 | What is an Upstream Server | ||
Details | Website | 2024-11-03 | 5 | Supply Chain Security Incident: Analysis of the LottieFiles NPM Package Compromise | ||
Details | Website | 2024-11-02 | 0 | Cybersecurity for Hyperscale Data Centers — Unique Challenges in Defending Massive Networks | ||
Details | Website | 2024-11-01 | 0 | LottieFiles confirmed a supply chain attack on Lottie-Player | ||
Details | Website | 2024-11-01 | 1 | LottieFiles Supply Chain Attack: Compromised npm Package Targets Cryptocurrency Wallets - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-11-01 | 2 | Cyber Briefing: 2024.11.01 | ||
Details | Website | 2024-11-01 | 2 | LottieFiles Supply Chain Attack: Compromised npm Package Targets Cryptocurrency Wallets | ||
Details | Website | 2024-10-31 | 0 | 🚨 LottieFiles Hacked: A Cautionary Tale for the Crypto Community! 🚨 | ||
Details | Website | 2024-10-31 | 2 | LottieFiles Issues Warning About Compromised "lottie-player" npm Package | ||
Details | Website | 2024-10-31 | 2 | LottieFiles Issues Warning About Compromised "lottie-player" npm Package - RedPacket Security | ||
Details | Website | 2024-10-31 | 0 | Holiday Cybersecurity Guide for Retail Businesses | ||
Details | Website | 2024-10-31 | 3 | With 2FA Enabled: NPM Package lottie-player Taken Over by Attackers | ||
Details | Website | 2024-10-31 | 0 | Supply Chain Attack Targets JavaScript’s Lottie-Player | Wiz Blog | ||
Details | Website | 2024-10-31 | 0 | LottieFiles hit in npm supply chain attack targeting users' crypto | ||
Details | Website | 2024-10-31 | 1 | LottieFiles hacked in supply chain attack to steal users’ crypto | ||
Details | Website | 2024-10-28 | 1185 | US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security | ||
Details | Website | 2024-10-28 | 54 | When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - MDSec | ||
Details | Website | 2024-10-28 | 0 | Montag: Ausbreitung von Robotaxis, Cyberangriffe auf italienische Berühmtheiten | ||
Details | Website | 2024-10-26 | 0 | The Power of Proxies: How Reverse Proxies and Load Balancers Transform Web Performance. |