Hacking with AWS: incorporating leaky buckets into your OSINT workflow | Malwarebytes Labs
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Domains - T1583.001 Domains - T1584.001 Email Addresses - T1589.002 Phishing - T1660 Phishing - T1566 Server - T1583.004 Server - T1584.004 Brute Force - T1110 |
Common Information
Type | Value |
---|---|
UUID | 134c6781-9e21-4326-95a1-dbcfb2bb73b8 |
Fingerprint | 1758999908961fcc |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 13, 2019, midnight |
Added to db | Sept. 26, 2022, 9:31 a.m. |
Last updated | Nov. 6, 2024, 4:19 p.m. |
Headline | Hacking with AWS: incorporating leaky buckets into your OSINT workflow |
Title | Hacking with AWS: incorporating leaky buckets into your OSINT workflow | Malwarebytes Labs |
Detected Hints/Tags/Attributes | 38/2/2 |
Source URLs
URL Provider