Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2024-09-11 13 How to Handle Secrets in Go
Details Website 2024-09-11 16 Ivanti fixed a maximum severity flaw in its EPM software
Details Website 2024-09-10 2 Comparing Anti-Detect Browsers & Bots-as-a-Service
Details Website 2024-09-10 0 Securing Your Applications Against CSRF Attacks: Best Practices for Cybersecurity Experts
Details Website 2024-09-10 25 Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
Details Website 2024-09-09 24 BLX STEALER - CYFIRMA
Details Website 2024-09-08 10 OWASP Research
Details Website 2024-09-05 12 Day 3–5 of 30 Days MyDFIR SOC Analyst Challenge
Details Website 2024-09-05 127 Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401 | FortiGuard Labs
Details Website 2024-09-04 4 MEGAsync Forensics and Intrusion Attribution
Details Website 2024-09-03 6 Comprehensive Guide to Installing, Configuring, and Testing SafeLine WAF
Details Website 2024-09-03 4 How SafeLine’s Dynamic Protection Safeguards Your Website
Details Website 2024-09-03 3 The New WAF Choice for Developers: SafeLine
Details Website 2024-09-02 2 Cyber Briefing: 2024.09.02
Details Website 2024-09-02 1 Data leaks: current threats for companies in H1 2024
Details Website 2024-09-01 6 IBM 제품 보안 업데이트 권고(CVE-2024-39747) - ASEC
Details Website 2024-09-01 6 IBM Product Security Update Advisory (CVE-2024-39747) - ASEC
Details Website 2024-09-01 5 Level 1: Active Reconnaissance — The Quest Begins
Details Website 2024-08-30 8 Parsing Fortinet Binary Firewall Logs
Details Website 2024-08-29 3 SAP 제품 보안 업데이트 권고(CVE-2024-42374)
Details Website 2024-08-29 4 SAP Product Security Update Advisory (CVE-2024-42374)
Details Website 2024-08-28 12 Chamilo LMS 1.11.14: Analysis of Two Blind SQL Injection Vulnerabilities
Details Website 2024-08-12 25 The SOS Intelligence CVE Chatter Weekly Top Ten - 12 August 2024 - SOS Intelligence
Details Website 2024-08-07 0 Network perimeter security protections for generative AI | Amazon Web Services
Details Website 2024-07-31 7 Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps - Zimperium