Acquire and/or use 3rd party software services

A wide variety of 3rd party software services are available (e.g., Twitter, Dropbox, GoogleDocs). Use of these solutions allow an adversary to stage, launch, and execute an attack from infrastructure that does not physically tie back to them and can be rapidly provisioned, modified, and shut down. [1] [2]

ID: T1308

Tactic: Adversary Opsec

Version: 1.0

Similar Techniques by Tactic

TacticTechnique
Establish & Maintain InfrastructureAcquire and/or use 3rd party software services

Examples

NameDescription
APT1

APT1 used third party email services in the registration of whois records.[3]

Night Dragon

Night Dragon used third party hosting services in the U.S. in an attempt to hide their operations.[4]

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Defender will not have visibility over account creation for 3rd party software services.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: 3rd party services like these listed are freely available.

References

  1. Forward-Looking Threat Research Team. (2012). LUCKYCAT REDUX: Inside an APT Campaign with Multiple Targets in India and Japan. Retrieved March 1, 2017.
  2. Bart Blaze. (2016, November 20). Nemucod downloader spreading via Facebook. Retrieved March 28, 2017.