text
stringlengths
0
3.15k
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: Establish centralized logging of instance activity, which can be used to monitor and review system events even after reverting to a snapshot, rolling back changes, or changing persistence/type of storage. Monitor specifically for events related to snapshots and rollbacks and VM configuration chang...
More Information: https://attack.mitre.org/techniques/T1578/004
Technique ID: T1535
Name: Unused/Unsupported Cloud Regions
Description: Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure. Cloud service providers often provide infrastructure throughout the world in order to improve performance, p...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: Monitor system logs to review activities occurring across all cloud environments and regions. Configure alerting to notify of activity in normally unused regions or if the number of instances active in a region goes above a certain threshold.
More Information: https://attack.mitre.org/techniques/T1535
Technique ID: T1550
Name: Use Alternate Authentication Material
Description: Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. Authentication processes generally require a valid identity (e.g., username) along with...
Tactics: Defense Evasion, Lateral Movement
Platforms Affected: Containers, Google Workspace, IaaS, Office 365, SaaS, Windows
Detection Strategies: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultane...
More Information: https://attack.mitre.org/techniques/T1550
Technique ID: T1550.001
Name: Use Alternate Authentication Material: Application Access Token
Description: Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials. Application access tokens are used to...
Tactics: Defense Evasion, Lateral Movement
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Office 365, SaaS
Detection Strategies: Monitor access token activity for abnormal use and permissions granted to unusual or suspicious applications and APIs. Additionally, administrators should review logs for calls to the AWS Security Token Service (STS) and usage of GCP service accounts in order to identify anomalous actions.
More Information: https://attack.mitre.org/techniques/T1550/001
Technique ID: T1550.004
Name: Use Alternate Authentication Material: Web Session Cookie
Description: Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already authenticated. Authentication cookies are commonly used in web applications, including cloud-based services, after a u...
Tactics: Defense Evasion, Lateral Movement
Platforms Affected: Google Workspace, IaaS, Office 365, SaaS
Detection Strategies: Monitor for anomalous access of websites and cloud-based applications by the same user in different locations or by different systems that do not match expected configurations.
More Information: https://attack.mitre.org/techniques/T1550/004
Technique ID: T1110
Name: Brute Force
Description: Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute for...
Tactics: Credential Access
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials. Also monitor for many failed authentication attempts across various account...
More Information: https://attack.mitre.org/techniques/T1110
Technique ID: T1110.004
Name: Brute Force: Credential Stuffing
Description: Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The...
Tactics: Credential Access
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials.
More Information: https://attack.mitre.org/techniques/T1110/004
Technique ID: T1110.002
Name: Brute Force: Password Cracking
Description: Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option....
Tactics: Credential Access
Platforms Affected: Azure AD, Linux, Network, Office 365, Windows, macOS
Detection Strategies: It is difficult to detect when hashes are cracked, since this is generally done outside the scope of the target network. Consider focusing efforts on detecting other adversary behavior used to acquire credential materials, such as OS Credential Dumping or Kerberoasting.
More Information: https://attack.mitre.org/techniques/T1110/002
Technique ID: T1110.001
Name: Brute Force: Password Guessing
Description: Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversa...
Tactics: Credential Access
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials.
More Information: https://attack.mitre.org/techniques/T1110/001
Technique ID: T1110.003
Name: Brute Force: Password Spraying
Description: Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying uses one password (e.g. 'Password01'), or a small list of commonly used passwords, that may match the complexity policy of the domain. Log...
Tactics: Credential Access
Platforms Affected: Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: Monitor authentication logs for system and application login failures of Valid Accounts. Specifically, monitor for many failed authentication attempts across various accounts that may result from password spraying attempts. Consider the following event IDs: Domain Controllers: "Audit Logon" (Succ...
More Information: https://attack.mitre.org/techniques/T1110/003
Technique ID: T1555
Name: Credentials from Password Stores
Description: Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier f...
Tactics: Credential Access
Platforms Affected: IaaS, Linux, Windows, macOS
Detection Strategies: Monitor system calls, file read events, and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches (e.g. password, pwd, login, store, secure, credentials, etc.) in process memory for credentials. File read events shou...
More Information: https://attack.mitre.org/techniques/T1555
Technique ID: T1555.006
Name: Credentials from Password Stores: Cloud Secrets Management Stores
Description: Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault. Secrets managers support the secure centralized management of passwords, API keys, and other credential material. Where secrets managers a...
Tactics: Credential Access