TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 Years

2019-12-30 · Read original ↗

ATT&CK techniques detected

7 predictions
T1078.004Cloud Accounts
85%
“over the past few years. notably, there were two cloud - hosting firms suffered ransomware in 2019 : connectwise5 and insynq6, both of which locked up their cloud infrastructure and hindered customer operations. hacking the cloud itself this section was going to be about all the …”
T1566.002Spearphishing Link
65%
“via a kubernetes console to run cryptocurrency mining malware, 9 access attack : cloud credentials phished if you ’ re going to hack someone, cloud or otherwise, a phishing attack is probably the first thing you ’ d try. as one of the most likely ways an organization is going to …”
T1525Implant Internal Image
57%
“’ s easy to tweak a single configuration and have access fall open somewhere unseen. it ’ s compounded by the fact that cloud deployments are being done more and more by users inexperienced in operations or it security ( / content / f5 - labs - v2 / en / labs / articles / cisotoc…”
T1486Data Encrypted for Impact
51%
“which adds protection against server - side request forgery ( ssrf ) and some waf penetrating attacks3. cloud provider glitches when you outsource a major part of your it infrastructure to anyone, cloud or otherwise, you risk putting all your eggs in one basket. sometimes that ba…”
T1528Steal Application Access Token
49%
“via a kubernetes console to run cryptocurrency mining malware, 9 access attack : cloud credentials phished if you ’ re going to hack someone, cloud or otherwise, a phishing attack is probably the first thing you ’ d try. as one of the most likely ways an organization is going to …”
T1552.004Private Keys
42%
“: cloud credentials stolen there are many ways to steal authentication credentials beyond phishing. sometimes the details aren ’ t given, such as the case with cloud solution provider pcm ’ s breach of administrative credentials to clients ’ office365 accounts. 11 sometimes login…”
T1525Implant Internal Image
37%
“- in - 2018. html ), year after year. in many ways, access attacks are the result of a defender ’ s success in hardening all other attack avenues. access control is now one of the least protected areas of most organization ’ s defenses. the fact that the keys to the front door si…”

Summary

A deep dive into a wide variety of cloud-related security data breaches, both maliciously caused and accidental.