Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2023-03-24 3 Automate the deployment of an NGINX web service using Amazon ECS with TLS offload in CloudHSM | Amazon Web Services
Details Website 2023-03-23 0 Cybersecurity Interview Series: Technical Interviews
Details Website 2023-03-22 9 APT Profile: Sandworm - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-03-22 0 Cloud computing and security in 2023
Details Website 2023-03-21 2 CVE-2023-0391: CloudPanel Shared Certificate Vulnerability | Rapid7 Blog
Details Website 2023-03-21 15 Tco2 | TryHackMe
Details Website 2023-03-20 0 REST API FUZZING
Details Website 2023-03-17 13 Web Fundamentals | IDOR
Details Website 2023-03-17 5 HACKING VULNET:INTERNAL [TryHackMe] : CTF CHALLENGE
Details Website 2023-03-14 10 Netgear RAX30 Multiple Vulnerabilities
Details Website 2023-03-14 59 The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia | WeLiveSecurity
Details Website 2023-03-13 0 Are any of your home devices accessible over the internet? Here’s how you can tell.
Details Website 2023-03-13 2 Securing Your AWS Cloud
Details Website 2023-03-13 712 Vulnerability Summary for the Week of March 6, 2023 | CISA
Details Website 2023-03-08 0 Securing ways to share workplace passwords
Details Website 2023-03-07 85 Lazarus Group Attack Case Using Vulnerability of Certificate Software Commonly Used by Public Institutions and Universities - ASEC BLOG
Details Website 2023-03-07 10 Flash Notice: Threat Actors Exploiting SysAid Zero-Day Vulnerability
Details Website 2023-03-05 11 Day 49— Crocodile • Walkthrough • HackTheBox
Details Website 2023-03-03 0 At Least 30% of
Details Website 2023-03-02 199 Russia/Ukraine Update - February 2023
Details Website 2023-02-28 7 Kaiji Botnet Resurfaces, Unmasking Ares Hacking Group?
Details Website 2023-02-27 104 공공 기관 및 대학 등에 널리 사용하는 공인인증서 소프트웨어 취약점을 이용한 Lazarus 공격 그룹 공격 사례 - ASEC BLOG
Details Website 2023-02-27 0 JVNTA#96606604: Security Problem in Web Browser Permission Mechanism
Details Website 2023-02-27 37 奇安信威胁情报中心
Details Website 2023-02-21 3 Will Recent Police Action Deter DDoS For-Hire Services?