Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2021-08-12 27 My Steps of Reproducing ProxyShell
Details Website 2021-08-05 44 From Stranger to DA // Using PetitPotam to NTLM relay to Domain Administrato - Truesec
Details Website 2021-07-28 1 Northern Ireland suspends vaccine passport system after data leak
Details Website 2021-07-14 366 Oracle Critical Patch Update Advisory - July 2021
Details Website 2021-07-05 27 GitHub - hslatman/awesome-threat-intelligence: A curated list of Awesome Threat Intelligence resources
Details Website 2021-06-28 5 How a Docker footgun led to a vandal deleting NewsBlur’s MongoDB database
Details Website 2021-06-28 22 Nefilim Ransomware Attack Through a MITRE Att&ck Lens
Details Website 2021-06-22 6 NukeSped Copies Fileless Code From Bundlore, Leaves It Unused
Details Website 2021-06-22 5 NukeSped Copies Fileless Code From Bundlore, Leaves It Unused
Details Website 2021-06-16 0 Top Three Tactics for Optimizing DDoS Resiliency Testing | NETSCOUT
Details Website 2021-05-29 114 Attacking Active Directory: 0 to 0.9 | zer1t0
Details Website 2021-04-13 0 HTTPS over HTTP A Supply Chain Attack on Azure DevOps Server 2020
Details Website 2021-04-07 22 Dead Drop Resolvers - Espionage Inspired C&C Communication
Details Website 2021-04-07 4 Attack Detection Fundamentals 2021: Windows - Lab #4
Details Website 2021-04-06 93 Janeleiro, the time traveler: A new old banking trojan in Brazil | WeLiveSecurity
Details Website 2021-04-02 38 Web Server Monitoring Your Application on Nginx with Logz.io | Logz.io
Details Website 2021-03-25 4 2017 OWASP A4 Update: XML External Entities (XXE) | Infosec Resources
Details Website 2021-03-24 16 Golang Bot Starts Targeting WordPress Websites
Details Website 2021-03-23 1 1U Password Manager Review | Infosec Resources
Details Website 2021-03-16 92 日本の製造業を狙うTickグループ - セキュリティ事業 - マクニカ
Details Website 2021-03-08 402 Vulnerability Summary for the Week of March 1, 2021 | CISA
Details Website 2021-02-24 0 Security Risks for Audio-centric Social Media Apps
Details Website 2021-02-22 32 Threat Actors Exploit Accellion FTA for Data Theft and Extortion
Details Website 2021-02-22 8 Global Accellion data breaches linked to Clop ransomware gang
Details Website 2021-02-09 70 ​启明星辰ADLab | APT34组织最新攻击活动深度分析报告