Compromise Infrastructure: Web Services

Adversaries may compromise access to third-party web services that can be used during targeting. A variety of popular websites exist for legitimate users to register for web-based services, such as GitHub, Twitter, Dropbox, Google, SendGrid, etc. Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. Such web services can be abused during later stages of the adversary lifecycle, such as during Command and Control (Web Service), Exfiltration Over Web Service, or Phishing.[1] Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, particularly when access is stolen from legitimate users, adversaries can make it difficult to physically tie back operations to them. Additionally, leveraging compromised web-based email services may allow adversaries to leverage the trust associated with legitimate domains.

ID: T1584.006
Sub-technique of:  T1584
Platforms: PRE
Contributors: Dor Edry, Microsoft
Version: 1.2
Created: 01 October 2020
Last Modified: 15 October 2024

Procedure Examples

ID Name Description
G1012 CURIUM

CURIUM has compromised legitimate websites to enable strategic website compromise attacks.[2]

G1006 Earth Lusca

Earth Lusca has compromised Google Drive repositories.[3]

S1138 Gootloader

Gootloader can insert malicious scripts to compromise vulnerable content management systems (CMS).[4]

G0010 Turla

Turla has frequently used compromised WordPress sites for C2 infrastructure.[1]

G1035 Winter Vivern

Winter Vivern has used compromised WordPress sites to host malicious payloads for download.[5]

Mitigations

ID Mitigation Description
M1056 Pre-compromise

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.

Detection

ID Data Source Data Component Detects
DS0035 Internet Scan Response Content

Once adversaries leverage the abused web service as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known.[6]Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control Web Service or Exfiltration Over Web Service .

References