Common Information
Type | Value |
---|---|
Value |
CDNs - T1596.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a distributed, load balanced array of servers. CDNs may also allow organizations to customize content delivery based on the requestor’s geographical region. Adversaries may search CDN data to gather actionable information. Threat actors can use online resources and lookup tools to harvest information about content servers within a CDN. Adversaries may also seek and target CDN misconfigurations that leak sensitive information not intended to be hosted and/or do not have the same protection mechanisms (ex: login portals) as the content hosted on the organization’s website.(Citation: DigitalShadows CDN) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2019-12-19 | 2 | New low cost traffic analysis attacks and mitigations | Tor Project | ||
Details | Website | 2019-08-01 | 11 | APT trends report Q2 2019 | ||
Details | Website | 2019-06-04 | 18 | Magecart skimmers found on Amazon CloudFront CDN | Malwarebytes Labs | ||
Details | Website | 2019-05-02 | 0 | The end of torrents era in Russia | ||
Details | Website | 2019-04-13 | 168 | media.defcon.org | ||
Details | Website | 2019-01-16 | 0 | Top 3 Cyberattacks Targeting Proxy Servers | Radware Blog | ||
Details | Website | 2019-01-01 | 31 | A Deep Dive into Cobalt Strike Malleable C2 - Threatexpress | ||
Details | Website | 2018-12-31 | 2 | Looking Forward to 2019 - Let's Encrypt | ||
Details | Website | 2018-12-12 | 3 | What is Web Cache Poisoning? | Acunetix | ||
Details | Website | 2018-11-29 | 287 | Pervasive Brazilian Financial Malware Targets Bank Customers in Latin America and Europe | ||
Details | Website | 2018-10-22 | 0 | 2018 Web Security Scan Statistics & Reports | Invicti | ||
Details | Website | 2018-09-30 | 9 | Real World Serverless: The Video | ||
Details | Website | 2018-08-29 | 0 | Why CDNs Don’t Solve Your DDoS Problem | NETSCOUT | ||
Details | Website | 2018-08-20 | 3 | Wireshark For Network Threat Hunting: Creating Filters - Active Countermeasures | ||
Details | Website | 2018-08-20 | 19 | Edge-Side-Includes with Cloudflare Workers | ||
Details | Website | 2018-08-14 | 5 | Plight at the end of the tunnel | ||
Details | Website | 2018-08-14 | 18 | Leverage Browser Security Features to Secure Your Website | Invicti | ||
Details | Website | 2018-06-21 | 6 | DroneDeploy and Cloudflare Workers | ||
Details | Website | 2018-06-03 | 5 | Inside Firefox’s DOH engine | daniel.haxx.se | ||
Details | Website | 2018-04-10 | 29 | When SRI and CSP are not enough, the Browsealoud Story | ||
Details | Website | 2018-03-26 | 0 | DDoS Managed Service | NETSCOUT | ||
Details | Website | 2018-03-21 | 1 | Deprecating TLS 1.0 & 1.1 | ||
Details | Website | 2018-03-21 | 2 | IETF 101 Liveblog | ||
Details | Website | 2018-03-15 | 0 | CAPTCHA Limitations of Bot Mitigation | Radware Blog | ||
Details | Website | 2018-03-05 | 2 | A few things I've learned about computer networking |