Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2023-02-16 15 Facebook bug: A Journey from Code Execution to S3 Data Leak
Details Website 2023-02-13 261 Dalbit (m00nlight): Chinese Hacker Group's APT Attack Campaign - ASEC BLOG
Details Website 2023-02-02 23 New APT34 Malware Targets The Middle East
Details Website 2023-02-02 27 New APT34 Malware Targets The Middle East
Details Website 2023-01-31 10 Nozomi Networks Discovers Sewio RTLS Studio Vulnerabilities
Details Website 2023-01-31 261 달빗(Dalbit,m00nlight): 중국 해커 그룹의 APT 공격 캠페인 - ASEC BLOG
Details Website 2023-01-28 26 Uncovering a Fake Recruiter Scam
Details Website 2023-01-20 1 Ways to improve REST API security
Details Website 2023-01-20 14 Easy Peasy ON TRYHACKME #Tryhackme #Ctf
Details Website 2023-01-19 13 EmojiDeploy: Smile! Your Azure web service just got RCE’d ._.
Details Website 2023-01-16 34 You Move, They Follow: Uncovering Iran’s Mobile Legal Intercept System - The Citizen Lab
Details Website 2023-01-15 3 SSRF: What every beginner pentester should know
Details Website 2023-01-06 401 Unveiling of a large resilient infrastructure distributing information stealers
Details Website 2023-01-04 0 Organizations Undergoing Digital Transformation Must Utilize Breach and Attack Simulation
Details Website 2023-01-03 15 Google Workspace Attack Surface — Elastic Security Labs
Details Website 2023-01-02 47 Dark Web Profile: MuddyWater APT Group - SOCRadar
Details Website 2022-12-19 595 Blog
Details Website 2022-12-19 38 Real-time Dash: Monitoring IoT Data Initial State
Details Website 2022-12-16 70 SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs
Details Website 2022-12-14 28 Remote Code Execution in ONLYOFFICE - Nettitude Labs
Details Website 2022-12-12 0 The Need for Hybrid Cloud Reinforced by AWS Outages
Details Website 2022-12-12 0 Before Musk Riled Everyone Up With Misleading Twitter Files About ‘Shadowbanning,’ Musk Used The Tool To Hide Account Tracking His Plane
Details Website 2022-12-12 644 Vulnerability Summary for the Week of December 5, 2022 | CISA
Details Website 2022-12-08 93 DeathStalker targets legal entities with new Janicab variant
Details Website 2022-12-06 26 Operation Bleeding Bear — Elastic Security Labs