Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2023-04-18 9 Malware Analysis - aspackv2 - 8e12c4232322e22c2300c404ab435f6d - RedPacket Security
Details Website 2023-04-18 3 NVD - CVE-2023-21968
Details Website 2023-04-18 2 Detecting the Use of Stolen AWS Lambda Credentials
Details Website 2023-04-18 3 NVD - CVE-2023-21939
Details Website 2023-04-18 3 NVD - CVE-2023-21967
Details Website 2023-04-17 3 NVD - CVE-2023-1109
Details Website 2023-04-17 0 Cybercrime sets the gender equality bar
Details Website 2023-04-13 21 InfoSec Handlers Diary Blog - SANS Internet Storm Center
Details Website 2023-04-11 3 NVD - CVE-2023-28766
Details Website 2023-04-10 6 Hunting threats without leaving home- Part V
Details Website 2023-04-10 2 Google Play threat market: overview of dark web offers
Details Website 2023-04-08 1 DoNotSpy11 comes to Windows 11 22H2 Moment 2, Windows 10 22H2
Details Website 2023-04-07 3 How to Stop DOS/DDOS Attacks
Details Website 2023-04-07 3 Cyber security week in review: April 7, 2023
Details Website 2023-04-06 2 Intro to forensics in the cloud: A container was compromised. What’s next? | Wiz Blog
Details Website 2023-04-03 1 Testing For Broken Authentication and Session Management Issues with Burp Suite
Details Website 2023-04-01 55 The Rise of FusionCore An Emerging Cybercrime Group from Europe - CYFIRMA
Details Website 2023-03-31 0 German Police Raid DDoS-Friendly Host ‘FlyHosting’ – Krebs on Security
Details Website 2023-03-30 17 Malware Analysis - amadey - 32962e720a69b0ea507f89962cdacfac - RedPacket Security
Details Website 2023-03-30 17 Malware Analysis - amadey - 474154bf80eeca7d3be7614bea80b4b8 - RedPacket Security
Details Website 2023-03-29 0 Data leakage prevention — 3 simple steps
Details Website 2023-03-29 0 Hack-for-Hire Groups Provide Corporate Espionage
Details Website 2023-03-28 24 CVE Advisory - Full Disclosure Cisco ISE Path Traversal - Yoroi
Details Website 2023-03-27 56 Scarcruft Bolsters Arsenal for targeting individual Android devices
Details Website 2023-03-25 29 Cooctus-Stories | TryHackMe Walk