text stringlengths 0 3.15k |
|---|
MITRE ATT&CK Cloud Matrix - A Summary of Techniques and Detection Strategies |
============================================================== |
Introduction |
------------ |
The cloud matrix encompasses a range of techniques that adversaries may use to compromise cloud platforms. These techniques are part of a framework that outlines various strategies attackers employ to gain initial access, execute commands, exfiltrate data, and more. |
Techniques Overview |
------------------- |
Technique ID: T1189 |
Name: Drive-by Compromise |
Description: Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Acc... |
Tactics: Initial Access |
Platforms Affected: Linux, SaaS, Windows, macOS |
Detection Strategies: Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to ... |
More Information: https://attack.mitre.org/techniques/T1189 |
Technique ID: T1190 |
Name: Exploit Public-Facing Application |
Description: Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. Exploited applications are often websites/web servers, but can also include databases (like SQL), st... |
Tactics: Initial Access |
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS |
Detection Strategies: Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation. |
More Information: https://attack.mitre.org/techniques/T1190 |
Technique ID: T1566 |
Name: Phishing |
Description: Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, ... |
Tactics: Initial Access |
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Network intrusion detection systems and email gateways can be used to detect phishing with malicious attachments in transit. Detonation chambers may also be used to identify malicious attachments. Solutions can be signature and behavior based, but adversaries may construct attachments in a way to ... |
More Information: https://attack.mitre.org/techniques/T1566 |
Technique ID: T1566.002 |
Name: Phishing: Spearphishing Link |
Description: Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, ins... |
Tactics: Initial Access |
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: URL inspection within email (including expanding shortened links) can help detect links leading to known malicious sites as well as links redirecting to adversary infrastructure based by upon suspicious OAuth patterns with unusual TLDs.. Detonation chambers can be used to detect these links and ei... |
More Information: https://attack.mitre.org/techniques/T1566/002 |
Technique ID: T1566.004 |
Name: Phishing: Spearphishing Voice |
Description: Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that is employs the use of manipulating a user into providing access to systems through a phone call or othe... |
Tactics: Initial Access |
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1566/004 |
Technique ID: T1199 |
Name: Trusted Relationship |
Description: Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often gran... |
Tactics: Initial Access |
Platforms Affected: IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Establish monitoring for activity conducted by second and third party providers and other trusted entities that may be leveraged as a means to gain access to the network. Depending on the type of relationship, an adversary may have access to significant amounts of information about the target befo... |
More Information: https://attack.mitre.org/techniques/T1199 |
Technique ID: T1078 |
Name: Valid Accounts |
Description: Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for per... |
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS |
Detection Strategies: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultane... |
More Information: https://attack.mitre.org/techniques/T1078 |
Technique ID: T1078.004 |
Name: Valid Accounts: Cloud Accounts |
Description: Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources w... |
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation |
Platforms Affected: Azure AD, Google Workspace, IaaS, Office 365, SaaS |
Detection Strategies: Monitor the activity of cloud accounts to detect abnormal or malicious behavior, such as accessing information outside of the normal function of the account or account usage at atypical hours. |
More Information: https://attack.mitre.org/techniques/T1078/004 |
Technique ID: T1078.001 |
Name: Valid Accounts: Default Accounts |
Description: Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include ... |
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Monitor whether default accounts have been activated or logged into. These audits should also include checks on any appliances and applications for default credentials or SSH keys, and if any are discovered, they should be updated immediately. |
More Information: https://attack.mitre.org/techniques/T1078/001 |
Technique ID: T1651 |
Name: Cloud Administration Command |
Description: Adversaries may abuse cloud management services to execute commands within virtual machines or hybrid-joined devices. Resources such as AWS Systems Manager, Azure RunCommand, and Runbooks allow users to remotely run scripts in virtual machines by leveraging installed virtual machine agents. Similarly, in A... |
Tactics: Execution |
Platforms Affected: Azure AD, IaaS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1651 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.