text stringlengths 0 3.15k |
|---|
Technique ID: T1499.003 |
Name: Endpoint Denial of Service: Application Exhaustion Flood |
Description: Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources... |
Tactics: Impact |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Detection of Endpoint DoS can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness. Typical network throughput monitoring tools such as netflow, ... |
More Information: https://attack.mitre.org/techniques/T1499/003 |
Technique ID: T1499.004 |
Name: Endpoint Denial of Service: Application or System Exploitation |
Description: Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) c... |
Tactics: Impact |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Attacks targeting web applications may generate logs in the web server, application server, and/or database server that can be used to identify the type of attack. Externally monitor the availability of services that may be targeted by an Endpoint DoS. |
More Information: https://attack.mitre.org/techniques/T1499/004 |
Technique ID: T1499.002 |
Name: Endpoint Denial of Service: Service Exhaustion Flood |
Description: Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well. Web server software can be attacked through a variety of means, some of which apply g... |
Tactics: Impact |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Detection of Endpoint DoS can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness. Typical network throughput monitoring tools such as netflow, ... |
More Information: https://attack.mitre.org/techniques/T1499/002 |
Technique ID: T1657 |
Name: Financial Theft |
Description: Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types inc... |
Tactics: Impact |
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1657 |
Technique ID: T1490 |
Name: Inhibit System Recovery |
Description: Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery. This may deny access to available backups and recovery options. Operating systems may contain features that can help fix corrupted systems, such as a backup catalo... |
Tactics: Impact |
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS |
Detection Strategies: Use process monitoring to monitor the execution and command line parameters of binaries involved in inhibiting system recovery, such as vssadmin, wbadmin, bcdedit and REAgentC. The Windows event logs, ex. Event ID 524 indicating a system catalog was deleted, may contain entries associated with sus... |
More Information: https://attack.mitre.org/techniques/T1490 |
Technique ID: T1498 |
Name: Network Denial of Service |
Description: Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based application... |
Tactics: Impact |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Detection of Network DoS can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider. Typic... |
More Information: https://attack.mitre.org/techniques/T1498 |
Technique ID: T1498.001 |
Name: Network Denial of Service: Direct Network Flood |
Description: Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. This DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Direct Network Floods are when one or more systems are used to send a high-v... |
Tactics: Impact |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Detection of a network flood can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider. T... |
More Information: https://attack.mitre.org/techniques/T1498/001 |
Technique ID: T1498.002 |
Name: Network Denial of Service: Reflection Amplification |
Description: Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a... |
Tactics: Impact |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Detection of reflection amplification can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service pr... |
More Information: https://attack.mitre.org/techniques/T1498/002 |
Technique ID: T1496 |
Name: Resource Hijacking |
Description: Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume en... |
Tactics: Impact |
Platforms Affected: Containers, IaaS, Linux, Windows, macOS |
Detection Strategies: Consider monitoring process resource usage to determine anomalous activity associated with malicious hijacking of computer resources such as CPU, memory, and graphics processing resources. Monitor for suspicious use of network resources associated with cryptocurrency mining software. Monitor for c... |
More Information: https://attack.mitre.org/techniques/T1496 |
Conclusion |
---------- |
Each technique within the cloud matrix requires specific detection strategies. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.