Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2020-08-25 1 Browser-based cryptojacking sees sudden spike in activity in Q2 2020
Details Website 2020-07-28 9 Lazarus on the hunt for big game
Details Website 2020-07-14 23 SensePost | Clash of the (spam)titan
Details Website 2020-06-30 60 Ransomware on the Rise: Buran’s transformation into Zeppelin
Details Website 2020-06-09 32 Dark Basin: Uncovering a Massive Hack-For-Hire Operation - The Citizen Lab
Details Website 2020-05-22 164 Cyber-Criminal espionage Operation insists on Italian Manufacturing - Yoroi
Details Website 2020-05-07 26 Who’s Viktor? Tracking down the XTC/Polaris Botnets. | Radware Blog
Details Website 2020-04-23 0 Threat Modeling Apple and Google’s Covid-19 Contact Tracing Technology
Details Website 2020-04-23 85 Following ESET’s discovery, a Monero mining botnet is disrupted | WeLiveSecurity
Details Website 2020-04-22 88 Studying How Cybercriminals Prey on the COVID-19 Pandemic
Details Website 2020-03-31 86 Holy water: ongoing targeted water-holing attack in Asia
Details Website 2020-03-25 49 New Router DNS Hijacking Attacks Abuse Bitbucket to Host Infostealer
Details Website 2020-02-12 0 FIDO2 Deep Dive: Attestations, Trust model and Security
Details Website 2020-02-05 191 STOMP 2 DIS: Brilliance in the (Visual) Basics | Mandiant
Details Website 2020-01-06 372 Oracle Critical Patch Update Advisory - January 2020
Details Website 2019-12-16 2 TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover
Details Website 2019-12-12 31 DeCypherIT - All eggs in one basket - Check Point Research
Details Website 2019-10-18 21 Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser | WeLiveSecurity
Details Website 2019-10-17 37 Operation Ghost: The Dukes aren’t back – they never left | WeLiveSecurity
Details Website 2019-10-17 262 Oracle Critical Patch Update Advisory - October 2019
Details Website 2019-10-11 0 How our security team handle secrets
Details Website 2019-08-29 21 Heatstroke Used Multistage Phishing For Info Theft
Details Website 2019-08-29 21 Heatstroke Used Multistage Phishing For Info Theft
Details Website 2019-08-12 2 Making authentication even easier with FIDO2-based local user verification for Google Accounts
Details Website 2019-08-09 11 Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN | DEVCORE 戴夫寇爾