Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2022-12-01 47 DuckLogs - New Malware Strain Spotted In The Wild
Details Website 2022-11-16 0 Researchers Discover Hundreds of Amazon RDS Instances Leaking Users' Personal Data
Details Website 2022-10-27 10 FormBook Malware Being Distributed as .NET - ASEC BLOG
Details Website 2022-10-25 4 SecureWV 2022 Lucky Th1rt3en: Malware, ransomware, and maturity models
Details Website 2022-10-24 797 Vulnerability Summary for the Week of October 17, 2022 | CISA
Details Website 2022-10-21 11 CVE Advisory - Partial Disclosure CISCO ISE Path Traversal - Yoroi
Details Website 2022-10-18 4 NVD - CVE-2022-21618
Details Website 2022-10-18 4 NVD - CVE-2022-21626
Details Website 2022-10-11 5 Exchange Server: New 0-day (not NotProxyShell, CVE-2022-41040, CVE-2022-41082)
Details Website 2022-10-11 97 POLONIUM targets Israel with Creepy malware | WeLiveSecurity
Details Website 2022-10-06 4 S3 Ep103: Scammers in the Slammer (and other stories) [Audio + Text]
Details Website 2022-10-05 86 MAR-10365227-2.v1 - Impacket 2 | CISA
Details Website 2022-10-05 86 MAR-10365227-2.v1 - Impacket 2 | CISA
Details Website 2022-10-04 4 Hackers stole data from US defense org using Impacket, CovalentStealer
Details Website 2022-10-03 12 CERT/CC Vulnerability Note VU#915563
Details Website 2022-10-03 651 Vulnerability Summary for the Week of September 26, 2022 | CISA
Details Website 2022-09-27 21 Anomali Cyber Watch: Sandworm Uses HTML Smuggling and Commodity RATs, BlackCat Ransomware Adds New Features, Domain Shadowing Is Rarely Detected, and More
Details Website 2022-09-26 26 BlackMatter Ransomware Analysis; The Dark Side Returns
Details Website 2022-09-21 1 Uber’s Intranet Compromised Via Social Engineering | Threat Intelligence | CloudSEK
Details Website 2022-09-16 81 Some Kind of Monster: RaaS Hides Itself Using Traits From Other Malware
Details Website 2022-09-15 76 PrivateLoader: the loader of the prevalent ruzki PPI service
Details Website 2022-09-07 0 Enhancing Cloud Security by Reducing Container Images Through Distroless Techniques
Details Website 2022-09-07 0 Enhancing Cloud Security by Reducing Container Images Through Distroless Techniques
Details Website 2022-09-01 102 Attackers Using FRP (Fast Reverse Proxy) to Attack Korean Companies - ASEC BLOG
Details Website 2022-08-30 6 Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger