Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2022-04-19 4 NVD - CVE-2022-21426
Details Website 2022-04-19 4 NVD - CVE-2022-21476
Details Website 2022-04-04 480 Oracle Critical Patch Update Advisory - April 2022
Details Website 2022-03-07 11 AutoWarp: Azure Automation Vulnerability | Orca Research Pod
Details Website 2022-03-07 6 The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation
Details Website 2022-02-24 123 Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks | CISA
Details Website 2022-02-23 1 NSA-linked Bvp47 Linux backdoor widely undetected for 10 years
Details Website 2022-02-22 37 Ransomware Spotlight: Clop - Security News
Details Website 2022-02-22 16 Recent Cyberattacks Increasingly Target Open-source Web Servers
Details Website 2022-02-17 42 Post Mortem of KlaySwap Incident through BGP Hijacking | EN
Details Website 2022-01-25 95 Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Details Website 2022-01-25 95 Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Details Website 2022-01-10 27 Detecting Malware Script Loaders using Remcos: Threat Research Release December 2021
Details Website 2021-12-28 35 Implant.ARM.iLOBleed.a | Padvish Threats Database
Details Website 2021-12-12 2 3 New Malicious Packages Found on PyPI
Details Website 2021-12-03 7 XML vulnerabilities are still attractive targets for attackers | Infosec Resources
Details Website 2021-11-21 11 Pointer: Hunting Cobalt Strike globally
Details Website 2021-11-18 102 The Pitfall of Threat Intelligence Whitelisting: Specter Botnet is 'taking over' Top Legit DNS Domains By Using ClouDNS Service
Details Website 2021-11-09 15 Unboxing BusyBox - 14 new vulnerabilities uncovered by Claroty and JFrog | JFrog
Details Website 2021-10-19 1 Directory Traversal Vulnerability Found in CivetWeb | JFrog
Details Website 2021-10-19 70 Trickbot banking Trojan modules overview
Details Website 2021-10-05 9 Zero Day Initiative — CVE-2021-26420: Remote Code Execution in SharePoint via Workflow Compilation
Details Website 2021-09-16 0 Industry Insights: RDAP Becomes Internet Standard - Verisign Blog
Details Website 2021-09-14 17 PetitPotam – NTLM Relay to AD CS
Details Website 2021-09-01 4 How to Develop an Ethereum Smart Contract for Licensing? | Apriorit