text stringlengths 0 3.15k |
|---|
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: Establish centralized logging of instance activity, which can be used to monitor and review system events even after reverting to a snapshot, rolling back changes, or changing persistence/type of storage. Monitor specifically for events related to snapshots and rollbacks and VM configuration chang... |
More Information: https://attack.mitre.org/techniques/T1578/004 |
Technique ID: T1535 |
Name: Unused/Unsupported Cloud Regions |
Description: Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure. Cloud service providers often provide infrastructure throughout the world in order to improve performance, p... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: Monitor system logs to review activities occurring across all cloud environments and regions. Configure alerting to notify of activity in normally unused regions or if the number of instances active in a region goes above a certain threshold. |
More Information: https://attack.mitre.org/techniques/T1535 |
Technique ID: T1550 |
Name: Use Alternate Authentication Material |
Description: Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. Authentication processes generally require a valid identity (e.g., username) along with... |
Tactics: Defense Evasion, Lateral Movement |
Platforms Affected: Containers, Google Workspace, IaaS, Office 365, SaaS, Windows |
Detection Strategies: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultane... |
More Information: https://attack.mitre.org/techniques/T1550 |
Technique ID: T1550.001 |
Name: Use Alternate Authentication Material: Application Access Token |
Description: Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials. Application access tokens are used to... |
Tactics: Defense Evasion, Lateral Movement |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Office 365, SaaS |
Detection Strategies: Monitor access token activity for abnormal use and permissions granted to unusual or suspicious applications and APIs. Additionally, administrators should review logs for calls to the AWS Security Token Service (STS) and usage of GCP service accounts in order to identify anomalous actions. |
More Information: https://attack.mitre.org/techniques/T1550/001 |
Technique ID: T1550.004 |
Name: Use Alternate Authentication Material: Web Session Cookie |
Description: Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already authenticated. Authentication cookies are commonly used in web applications, including cloud-based services, after a u... |
Tactics: Defense Evasion, Lateral Movement |
Platforms Affected: Google Workspace, IaaS, Office 365, SaaS |
Detection Strategies: Monitor for anomalous access of websites and cloud-based applications by the same user in different locations or by different systems that do not match expected configurations. |
More Information: https://attack.mitre.org/techniques/T1550/004 |
Technique ID: T1110 |
Name: Brute Force |
Description: Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute for... |
Tactics: Credential Access |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS |
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials. Also monitor for many failed authentication attempts across various account... |
More Information: https://attack.mitre.org/techniques/T1110 |
Technique ID: T1110.004 |
Name: Brute Force: Credential Stuffing |
Description: Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The... |
Tactics: Credential Access |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials. |
More Information: https://attack.mitre.org/techniques/T1110/004 |
Technique ID: T1110.002 |
Name: Brute Force: Password Cracking |
Description: Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option.... |
Tactics: Credential Access |
Platforms Affected: Azure AD, Linux, Network, Office 365, Windows, macOS |
Detection Strategies: It is difficult to detect when hashes are cracked, since this is generally done outside the scope of the target network. Consider focusing efforts on detecting other adversary behavior used to acquire credential materials, such as OS Credential Dumping or Kerberoasting. |
More Information: https://attack.mitre.org/techniques/T1110/002 |
Technique ID: T1110.001 |
Name: Brute Force: Password Guessing |
Description: Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversa... |
Tactics: Credential Access |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS |
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials. |
More Information: https://attack.mitre.org/techniques/T1110/001 |
Technique ID: T1110.003 |
Name: Brute Force: Password Spraying |
Description: Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying uses one password (e.g. 'Password01'), or a small list of commonly used passwords, that may match the complexity policy of the domain. Log... |
Tactics: Credential Access |
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. Specifically, monitor for many failed authentication attempts across various accounts that may result from password spraying attempts. Consider the following event IDs: Domain Controllers: "Audit Logon" (Succ... |
More Information: https://attack.mitre.org/techniques/T1110/003 |
Technique ID: T1555 |
Name: Credentials from Password Stores |
Description: Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier f... |
Tactics: Credential Access |
Platforms Affected: IaaS, Linux, Windows, macOS |
Detection Strategies: Monitor system calls, file read events, and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches (e.g. password, pwd, login, store, secure, credentials, etc.) in process memory for credentials. File read events shou... |
More Information: https://attack.mitre.org/techniques/T1555 |
Technique ID: T1555.006 |
Name: Credentials from Password Stores: Cloud Secrets Management Stores |
Description: Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault. Secrets managers support the secure centralized management of passwords, API keys, and other credential material. Where secrets managers a... |
Tactics: Credential Access |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.