Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2024-11-15 0 Active Directory Certificate Services— Part 1
Details Website 2024-11-14 0 Cloud Ransomware Flexes Fresh Scripts Against Web Apps | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 10 The State of Cloud Ransomware in 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 10 The State of Cloud Ransomware in 2024
Details Website 2024-11-13 24 Lessons from a Honeypot with US Citizens’ Data
Details Website 2024-11-13 6 Cracking Cybersploit2 CTF: A Step-by-Step Guide to Root Access
Details Website 2024-11-11 12 Hack The Box : Tier 1 Starting Point -Responder
Details Website 2024-11-08 18 HTBAcademy-Footprinting-IMAP/POP3
Details Website 2024-11-08 35 Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
Details Website 2024-11-07 9 Dark Web Profile: KillSec - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-07 11 Dark Web Profile: KillSec
Details Website 2024-11-06 44 GodFather Malware Targets 500 Banking & Crypto Apps Worldwide
Details Website 2024-11-05 0 Implement effective data authorization mechanisms to secure your data used in generative AI applications | Amazon Web Services
Details Website 2024-11-04 35 G700 : The Next Generation of Craxs RAT - CYFIRMA
Details Website 2024-10-31 69 Comprehensive Bug Bounty Hunting Methodology (2024 Edition)
Details Website 2024-10-31 18 NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities
Details Website 2024-10-31 0 UnitedHealth Hires Longtime Cybersecurity Executive as CISO
Details Website 2024-10-31 18 NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities
Details Website 2024-10-29 9 CVE-2024-6678: GitLab Authentication Bypass Vulnerability
Details Website 2024-10-28 1185 US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security
Details Website 2024-10-28 54 When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - MDSec
Details Website 2024-10-28 28 Katz and Mouse Game: MaaS Infostealers Adapt to Patched Chrome Defenses — Elastic Security Labs
Details Website 2024-10-27 0 Using AI and YARA
Details Website 2024-10-26 22 CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities