text
stringlengths
0
3.15k
MITRE ATT&CK Cloud Matrix - A Summary of Techniques and Detection Strategies
==============================================================
Introduction
------------
The cloud matrix encompasses a range of techniques that adversaries may use to compromise cloud platforms. These techniques are part of a framework that outlines various strategies attackers employ to gain initial access, execute commands, exfiltrate data, and more.
Techniques Overview
-------------------
Technique ID: T1189
Name: Drive-by Compromise
Description: Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Acc...
Tactics: Initial Access
Platforms Affected: Linux, SaaS, Windows, macOS
Detection Strategies: Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to ...
More Information: https://attack.mitre.org/techniques/T1189
Technique ID: T1190
Name: Exploit Public-Facing Application
Description: Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. Exploited applications are often websites/web servers, but can also include databases (like SQL), st...
Tactics: Initial Access
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS
Detection Strategies: Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation.
More Information: https://attack.mitre.org/techniques/T1190
Technique ID: T1566
Name: Phishing
Description: Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, ...
Tactics: Initial Access
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Network intrusion detection systems and email gateways can be used to detect phishing with malicious attachments in transit. Detonation chambers may also be used to identify malicious attachments. Solutions can be signature and behavior based, but adversaries may construct attachments in a way to ...
More Information: https://attack.mitre.org/techniques/T1566
Technique ID: T1566.002
Name: Phishing: Spearphishing Link
Description: Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, ins...
Tactics: Initial Access
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: URL inspection within email (including expanding shortened links) can help detect links leading to known malicious sites as well as links redirecting to adversary infrastructure based by upon suspicious OAuth patterns with unusual TLDs.. Detonation chambers can be used to detect these links and ei...
More Information: https://attack.mitre.org/techniques/T1566/002
Technique ID: T1566.004
Name: Phishing: Spearphishing Voice
Description: Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that is employs the use of manipulating a user into providing access to systems through a phone call or othe...
Tactics: Initial Access
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1566/004
Technique ID: T1199
Name: Trusted Relationship
Description: Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often gran...
Tactics: Initial Access
Platforms Affected: IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Establish monitoring for activity conducted by second and third party providers and other trusted entities that may be leveraged as a means to gain access to the network. Depending on the type of relationship, an adversary may have access to significant amounts of information about the target befo...
More Information: https://attack.mitre.org/techniques/T1199
Technique ID: T1078
Name: Valid Accounts
Description: Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for per...
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Detection Strategies: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultane...
More Information: https://attack.mitre.org/techniques/T1078
Technique ID: T1078.004
Name: Valid Accounts: Cloud Accounts
Description: Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources w...
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation
Platforms Affected: Azure AD, Google Workspace, IaaS, Office 365, SaaS
Detection Strategies: Monitor the activity of cloud accounts to detect abnormal or malicious behavior, such as accessing information outside of the normal function of the account or account usage at atypical hours.
More Information: https://attack.mitre.org/techniques/T1078/004
Technique ID: T1078.001
Name: Valid Accounts: Default Accounts
Description: Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include ...
Tactics: Defense Evasion, Initial Access, Persistence, Privilege Escalation
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Monitor whether default accounts have been activated or logged into. These audits should also include checks on any appliances and applications for default credentials or SSH keys, and if any are discovered, they should be updated immediately.
More Information: https://attack.mitre.org/techniques/T1078/001
Technique ID: T1651
Name: Cloud Administration Command
Description: Adversaries may abuse cloud management services to execute commands within virtual machines or hybrid-joined devices. Resources such as AWS Systems Manager, Azure RunCommand, and Runbooks allow users to remotely run scripts in virtual machines by leveraging installed virtual machine agents. Similarly, in A...
Tactics: Execution
Platforms Affected: Azure AD, IaaS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1651