Common Information
Type | Value |
---|---|
Value |
CDNs - T1596.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a distributed, load balanced array of servers. CDNs may also allow organizations to customize content delivery based on the requestor’s geographical region. Adversaries may search CDN data to gather actionable information. Threat actors can use online resources and lookup tools to harvest information about content servers within a CDN. Adversaries may also seek and target CDN misconfigurations that leak sensitive information not intended to be hosted and/or do not have the same protection mechanisms (ex: login portals) as the content hosted on the organization’s website.(Citation: DigitalShadows CDN) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-01-20 | 2 | Subdomain enumeration as a countermeasure: introducing the Silent Push Subdomain Finder — Silent Push Threat Intelligence | ||
Details | Website | 2023-11-20 | 10 | Redirectors: A Red Teamer’s Introduction | ||
Details | Website | 2023-11-17 | 19 | Stat! 3 Must-Have Data Filtering Techniques | ||
Details | Website | 2023-11-07 | 1 | Introducing Badger Swarm: New Project Helps Privacy Badger Block Ever More Trackers | ||
Details | Website | 2023-10-23 | 0 | Google Chrome wants to hide your IP address | ||
Details | Website | 2023-10-17 | 1 | 6 Common Phishing Attacks and How to Protect Against Them | ||
Details | Website | 2023-10-12 | 1 | How Prisma saved 98% on distribution costs with Cloudflare R2 | ||
Details | Website | 2023-10-10 | 0 | How AWS protects customers from DDoS events | Amazon Web Services | ||
Details | Website | 2023-08-25 | 80 | Adversary On The Defense: ANTIBOT.PW - InQuest | ||
Details | Website | 2023-08-02 | 0 | Akamai Extends API Security Services After Neosec Acquisition | ||
Details | Website | 2023-07-30 | 10 | Experiment #3 | ||
Details | Website | 2023-07-24 | 0 | Unmasking the Storm: Battling the Rising Tide of DDoS Attacks | ||
Details | Website | 2023-07-22 | 6 | About TLS, DNS, Encryption and OPSEC concepts | ||
Details | Website | 2023-07-21 | 1 | Global CDN Service 'jsdelivr' Exposed Users to Phishing Attacks | ||
Details | Website | 2023-07-19 | 0 | AWS Reliability Pillar: Consistent Cloud Architecture | ||
Details | Website | 2023-07-11 | 3 | Confidential Clean Rooms for Mobile Telematics Model IP Protection | ||
Details | Website | 2023-07-04 | 0 | DDoS attacks have the biggest impact in APAC | ||
Details | Website | 2023-06-28 | 0 | Safeguarding Business Continuity: Defending Against DDoS Attacks | Cyberroot Risk Advisory | ||
Details | Website | 2023-06-27 | 2 | NIS2 einfach erklärt | ||
Details | Website | 2023-06-25 | 0 | NETWORK MANAGEMENT AND TROUBLESHOOTING | ||
Details | Website | 2023-06-23 | 0 | DoS/DDoS Attacks Types, Countermeasures | ||
Details | Website | 2023-06-22 | 0 | How we think about Zero Trust Performance | ||
Details | Website | 2023-06-21 | 0 | Spotlight on Zero Trust: We're fastest and here's the proof | ||
Details | Website | 2023-06-21 | 0 | It's never been easier to migrate thanks to Cloudflare's new Migration Hub | ||
Details | Website | 2023-06-20 | 13 | Demystifying Cyber Attacks: A Comprehensive Exploration of Common Threats |