Common Information
Type Value
Value
Web Service - T1102
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed). Detection: Host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure or the presence of strong encryption. Packet capture analysis will require SSL/TLS inspection if data is encrypted. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). User behavior monitoring may help to detect abnormal patterns of activity. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Host network interface, Netflow/Enclave netflow, Network protocol analysis, Packet capture, SSL/TLS inspection Defense Bypassed: Binary Analysis, Log analysis, Firewall Permissions Required: User Requires Network: Yes Contributors: Anastasios Pingios
Details Published Attributes CTI Title
Details Website 2023-11-09 1 Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability
Details Website 2023-11-09 1 Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability - RedPacket Security
Details Website 2023-11-09 7 Update now! SysAid vulnerability is actively being exploited by ransomware affiliate | Malwarebytes
Details Website 2023-11-09 10 Path Traversal Leading to Compromise: SysAid On-Prem Software CVE-2023-47246 Vulnerability
Details Website 2023-11-09 5 MOVEit cybercriminals behind SysAid zero-day attack
Details Website 2023-11-09 7 Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacks
Details Website 2023-11-08 18 SysAid On-Prem Software CVE-2023-47246 Vulnerability - SysAid
Details Website 2023-11-06 10 Your printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE 戴夫寇爾
Details Website 2023-11-06 10 Your printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE 戴夫寇爾
Details Website 2023-11-03 8 Rewterz Threat Advisory – Multiple Cisco Firepower Management Center Software Vulnerabilities
Details Website 2023-11-03 3 How to create an AMI hardening pipeline and automate updates to your ECS instance fleet | Amazon Web Services
Details Website 2023-11-02 2 Cisco Patches 27 Vulnerabilities in Network Security Products
Details Website 2023-10-31 5 Understanding Cisco IOS XE Vulnerabilities: CVE-2023-20198 and More
Details Website 2023-10-31 53 An In-Depth Look at Rhysida Ransomware
Details Website 2023-10-31 1 Search | arXiv e-print repository
Details Website 2023-10-30 5 Cisco IOS XE CVE-2023-20198: Deep Dive and POC
Details Website 2023-10-30 0 EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
Details Website 2023-10-30 0 EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub - RedPacket Security
Details Website 2023-10-27 4 Rewterz Threat Advisory – ICS: Multiple Rockwell Automation Vulnerabilities
Details Website 2023-10-26 4 Social Login API Exploits Risked Billions of Login Credentials
Details Website 2023-10-25 1 Grammarly says it corrected sign-in vulnerabilities after alert from cyber researchers
Details Website 2023-10-24 918 US-CERT Vulnerability Summary for the Week of October 16, 2023 - RedPacket Security
Details Website 2023-10-23 1 Casio Hacked: Customers' Personal Details Exposed
Details Website 2023-10-23 82 Israeli-Palestinian Conflict: Multifaceted Alliances and Fierce Cyberspace Battle - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2023-10-21 0 Global Encryption Day: Protecting our first line of defense