Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2016-07-15 0 What are the benefits of a VPN service? | 360 Total Security Blog
Details Website 2016-07-07 3 Remote Code Execution in Xiaomi MIUI Analytics
Details Website 2016-07-06 3 New Mac backdoor malware: Eleanor | Malwarebytes Labs
Details Website 2016-07-05 2 New Backdoor Allows Full Access to Mac Systems, Bitdefender Warns
Details Website 2016-07-01 12 UPC UBEE EVW3226 WPA2 Password Reverse Engineering, rev 3
Details Website 2016-06-30 7 Current Android Malware
Details Website 2016-06-30 35 The Black Hat Arsenal USA 2016 Remarkable Line-Up ! – UNDER CONSTRUCTION
Details Website 2016-06-27 0 The importance of understanding your digital footprint | Trend Micro News
Details Website 2016-06-23 2 InfoSecurity Europe: AWS Security Best Practices
Details Website 2016-06-16 2 Scanning Live Ethereum Contracts for the "Unchecked-Send" Bug
Details Website 2016-06-08 2 But have I really been pwned? Vetting your data | Malwarebytes Labs
Details Website 2016-06-06 0 9-vendor authentication roundup: The good, the bad and the ugly
Details Website 2016-06-02 4 Here are the specific ways the 2016 Republican National Convention (RNC) and Democratic National Convention (DNC) will be Cyber-Attacked | Radware Blog
Details Website 2016-05-16 2 Click Trajectories: End-to-end analysis of the spam value chain | the morning paper
Details Website 2016-05-08 12 Poisoning the Well – Compromising GoDaddy Customer Support With Blind XSS
Details Website 2016-01-28 1 ‘Application not compatible’: Bayrob may be stealing your info | WeLiveSecurity
Details Website 2015-11-11 0 What is SQL Injection? | Rapid7 Blog
Details Website 2015-11-11 3 One million requests per second: Dependable and dynamic distributed systems at scale
Details Website 2015-10-26 2 Ellison Pits Oracle Cloud Against AWS, Azure
Details Website 2015-09-20 37 CSAW 2015 – Web 500 (Weebdate) Writeup | Brett Buerhaus
Details Website 2015-09-17 2 Mobile applications instrumentation and reverse engineering, no-jailbreak style
Details Website 2015-09-06 1 Splunk Threat Intel IOC Integration via Lookups - Nextron Systems
Details Website 2015-09-04 0 Sophisticated webinjects ‘tailored’ to beat bank security | WeLiveSecurity
Details Website 2015-08-27 22 Hunter Exploit Kit Targets Banking Customers | Proofpoint
Details Website 2015-08-19 1 Create hidden service in TOR like Silk Road or DarkNet