Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2024-07-29 20 Attackers (Crowd)Strike with Infostealer Malware - Perception Point
Details Website 2024-07-25 835 Mid-year Doppelgänger information operations in Europe and the US
Details Website 2024-07-11 26 MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2
Details Website 2024-07-03 1 HackTheBox Certified Bug Bounty Hunter Review
Details Website 2024-07-01 62 Kimsuky deploys TRANSLATEXT to target South Korean academia
Details Website 2024-06-17 0 Nighthawk 0.3 - Automate All the Things - MDSec
Details Website 2024-06-13 89 Arid Viper poisons Android apps with AridSpy
Details Website 2024-05-31 11 WASM Smuggling for Initial Access and W.A.L.K. Tool Release | JUMPSEC LABS
Details Website 2024-05-15 4 HP Wolf Security Threat Insights Report Q1 2024 | HP Wolf Security
Details Website 2024-04-09 7 Raspberry Robin Now Spreading Through Windows Script Files | HP Wolf Security
Details Website 2024-03-28 9 Coverage Advisory for CVE-2023-47246 SysAid Zero-Day Vulnerability
Details Website 2024-02-01 47 VajraSpy: A Patchwork of espionage apps
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-23 18 ParaSiteSnatcher How Malicious Chrome Extensions Target Brazil
Details Website 2023-11-20 37 Cryptojacking Attack Campaign Against Apache Web Servers Using Cobalt Strike - ASEC BLOG
Details Website 2023-11-19 117 LitterDrifter: a new USB worm used by the Gamaredon group
Details Website 2023-11-18 1 Kubernetes Security on AWS: A Practical Guide
Details Website 2023-11-17 2 Metasploit Weekly Wrap-Up | Rapid7 Blog
Details Website 2023-11-16 6 Coverage Advisory for CVE-2023-47246 SysAid Zero-Day Vulnerability
Details Website 2023-11-15 0 How to stay protected on the web this holiday season
Details Website 2023-11-13 15 13th November – Threat Intelligence Report - Check Point Research
Details Website 2023-11-13 8 Rewterz Threat Alert – Clop Ransomware Deployed Using SysAid Zero-Day Vulnerability – Active IOCs
Details Website 2023-11-10 6 SysAid Zero-Day Vulnerability Exploited by Threat Actors
Details Website 2023-11-10 14 SysAid IT Service Software 0-day Exploited to Deploy Cl0p Ransomware
Details Website 2023-11-10 7 Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacks - RedPacket Security