text
stringlengths
0
3.15k
Technique ID: T1499.003
Name: Endpoint Denial of Service: Application Exhaustion Flood
Description: Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources...
Tactics: Impact
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Detection of Endpoint DoS can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness. Typical network throughput monitoring tools such as netflow, ...
More Information: https://attack.mitre.org/techniques/T1499/003
Technique ID: T1499.004
Name: Endpoint Denial of Service: Application or System Exploitation
Description: Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) c...
Tactics: Impact
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Attacks targeting web applications may generate logs in the web server, application server, and/or database server that can be used to identify the type of attack. Externally monitor the availability of services that may be targeted by an Endpoint DoS.
More Information: https://attack.mitre.org/techniques/T1499/004
Technique ID: T1499.002
Name: Endpoint Denial of Service: Service Exhaustion Flood
Description: Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well. Web server software can be attacked through a variety of means, some of which apply g...
Tactics: Impact
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Detection of Endpoint DoS can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness. Typical network throughput monitoring tools such as netflow, ...
More Information: https://attack.mitre.org/techniques/T1499/002
Technique ID: T1657
Name: Financial Theft
Description: Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types inc...
Tactics: Impact
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1657
Technique ID: T1490
Name: Inhibit System Recovery
Description: Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery. This may deny access to available backups and recovery options. Operating systems may contain features that can help fix corrupted systems, such as a backup catalo...
Tactics: Impact
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS
Detection Strategies: Use process monitoring to monitor the execution and command line parameters of binaries involved in inhibiting system recovery, such as vssadmin, wbadmin, bcdedit and REAgentC. The Windows event logs, ex. Event ID 524 indicating a system catalog was deleted, may contain entries associated with sus...
More Information: https://attack.mitre.org/techniques/T1490
Technique ID: T1498
Name: Network Denial of Service
Description: Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based application...
Tactics: Impact
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Detection of Network DoS can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider. Typic...
More Information: https://attack.mitre.org/techniques/T1498
Technique ID: T1498.001
Name: Network Denial of Service: Direct Network Flood
Description: Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. This DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Direct Network Floods are when one or more systems are used to send a high-v...
Tactics: Impact
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Detection of a network flood can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider. T...
More Information: https://attack.mitre.org/techniques/T1498/001
Technique ID: T1498.002
Name: Network Denial of Service: Reflection Amplification
Description: Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a...
Tactics: Impact
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Detection of reflection amplification can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service pr...
More Information: https://attack.mitre.org/techniques/T1498/002
Technique ID: T1496
Name: Resource Hijacking
Description: Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume en...
Tactics: Impact
Platforms Affected: Containers, IaaS, Linux, Windows, macOS
Detection Strategies: Consider monitoring process resource usage to determine anomalous activity associated with malicious hijacking of computer resources such as CPU, memory, and graphics processing resources. Monitor for suspicious use of network resources associated with cryptocurrency mining software. Monitor for c...
More Information: https://attack.mitre.org/techniques/T1496
Conclusion
----------
Each technique within the cloud matrix requires specific detection strategies.