Common Information
Type Value
Value
CDNs - T1596.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a distributed, load balanced array of servers. CDNs may also allow organizations to customize content delivery based on the requestor’s geographical region. Adversaries may search CDN data to gather actionable information. Threat actors can use online resources and lookup tools to harvest information about content servers within a CDN. Adversaries may also seek and target CDN misconfigurations that leak sensitive information not intended to be hosted and/or do not have the same protection mechanisms (ex: login portals) as the content hosted on the organization’s website.(Citation: DigitalShadows CDN) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)).
Details Published Attributes CTI Title
Details Website 2024-01-20 2 Subdomain enumeration as a countermeasure: introducing the Silent Push Subdomain Finder — Silent Push Threat Intelligence
Details Website 2023-11-20 10 Redirectors: A Red Teamer’s Introduction
Details Website 2023-11-17 19 Stat! 3 Must-Have Data Filtering Techniques
Details Website 2023-11-07 1 Introducing Badger Swarm: New Project Helps Privacy Badger Block Ever More Trackers
Details Website 2023-10-23 0 Google Chrome wants to hide your IP address
Details Website 2023-10-17 1 6 Common Phishing Attacks and How to Protect Against Them
Details Website 2023-10-12 1 How Prisma saved 98% on distribution costs with Cloudflare R2
Details Website 2023-10-10 0 How AWS protects customers from DDoS events | Amazon Web Services
Details Website 2023-08-25 80 Adversary On The Defense: ANTIBOT.PW - InQuest
Details Website 2023-08-02 0 Akamai Extends API Security Services After Neosec Acquisition
Details Website 2023-07-30 10 Experiment #3
Details Website 2023-07-24 0 Unmasking the Storm: Battling the Rising Tide of DDoS Attacks
Details Website 2023-07-22 6 About TLS, DNS, Encryption and OPSEC concepts
Details Website 2023-07-21 1 Global CDN Service 'jsdelivr' Exposed Users to Phishing Attacks
Details Website 2023-07-19 0 AWS Reliability Pillar: Consistent Cloud Architecture
Details Website 2023-07-11 3 Confidential Clean Rooms for Mobile Telematics Model IP Protection
Details Website 2023-07-04 0 DDoS attacks have the biggest impact in APAC
Details Website 2023-06-28 0 Safeguarding Business Continuity: Defending Against DDoS Attacks | Cyberroot Risk Advisory
Details Website 2023-06-27 2 NIS2 einfach erklärt
Details Website 2023-06-25 0 NETWORK MANAGEMENT AND TROUBLESHOOTING
Details Website 2023-06-23 0 DoS/DDoS Attacks Types, Countermeasures
Details Website 2023-06-22 0 How we think about Zero Trust Performance
Details Website 2023-06-21 0 Spotlight on Zero Trust: We're fastest and here's the proof
Details Website 2023-06-21 0 It's never been easier to migrate thanks to Cloudflare's new Migration Hub
Details Website 2023-06-20 13 Demystifying Cyber Attacks: A Comprehensive Exploration of Common Threats