Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2018-04-27 3 Using Docker When Developing a Web Service: What Do You Need To Consider? | Apriorit
Details Website 2018-04-23 0 Attacks on Encrypted Services | NETSCOUT
Details Website 2018-04-10 29 When SRI and CSP are not enough, the Browsealoud Story
Details Website 2018-04-04 10 Cryptocurrency Miner Script Found on AOL Ad Platform
Details Website 2018-03-30 2 FortiGuard Labs Discovers Vulnerability in D-Link Router DIR868L
Details Website 2018-03-28 3 Angry Users Donate $120K to Cancer Research After Brian Krebs' Coinhive Article
Details Website 2018-03-07 0 Managed DDoS Service: What Separates Good from Great | NETSCOUT
Details Website 2018-03-01 18 GCHQ Covernames/Programs and Suggested Use/Implementation
Details Website 2018-02-28 3 Evolution of HTTP and DNS for 5G | NETSCOUT
Details Website 2018-02-21 8 XMRig Miner Now Targeting Oracle WebLogic and Jenkins Servers to Mine Monero
Details Website 2018-02-14 9 Understanding the Limitations of HTTPS
Details Website 2018-02-14 34 Linux.IotReaper Analysis - Security Art Work
Details Website 2018-01-18 0 Cloud Migration: Technical and Business Considerations | Imperva
Details Website 2018-01-18 29 The Complete Guide To Deploying JavaScript Applications - Part 2: Single Page Applications, Logging, SSL
Details Website 2018-01-17 0 Twitter Activist Security
Details Website 2018-01-09 23 Four Ways to Bypass Android SSL Verification and Certificate Pinning
Details Website 2017-11-13 10 TALOS-2017-0386 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
Details Website 2017-11-02 13 How to Build Your Own Blockchain Part 3 — Writing Nodes that Mine and Talk
Details Website 2017-10-30 15 A Guide to Attacking Domain Trusts
Details Website 2017-10-26 42 NotPetya pulls BadRabbit out of the hat
Details Website 2017-10-25 8 Why the World is Under the Spell of IoT_Reaper | Radware Blog
Details Website 2017-10-25 1 iOS Privacy: watch.user - Access both iPhone cameras any time your app is running · Felix Krause
Details Website 2017-10-16 14 VulnHub Walkthrough: RickdiculouslyEasy 1 – n00py Blog
Details Website 2017-09-25 0 Deloitte hit by cyber-attack revealing clients’ secret emails
Details Website 2017-09-22 2 “Tasking” Office 365 for Cobalt Strike C2