T1204.003 Malicious Image Mappings

Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via Upload Malware, and users may then download and deploy an instance or container from the image without realizing the image is malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that executes cryptocurrency mining, in the instance or container.(Citation: Summit Route Malicious AMIs)

Adversaries may also name images a certain way to increase the chance of users mistakenly deploying an instance or container from the image (ex: Match Legitimate Name or Location).(Citation: Aqua Security Cloud Native Threat Report June 2021)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-4 Information Flow Enforcement Protects T1204.003 Malicious Image
CA-7 Continuous Monitoring Protects T1204.003 Malicious Image
CA-8 Penetration Testing Protects T1204.003 Malicious Image
CM-2 Baseline Configuration Protects T1204.003 Malicious Image
CM-6 Configuration Settings Protects T1204.003 Malicious Image
CM-7 Least Functionality Protects T1204.003 Malicious Image
RA-5 Vulnerability Monitoring and Scanning Protects T1204.003 Malicious Image
SC-44 Detonation Chambers Protects T1204.003 Malicious Image
SC-7 Boundary Protection Protects T1204.003 Malicious Image
SI-2 Flaw Remediation Protects T1204.003 Malicious Image
SI-3 Malicious Code Protection Protects T1204.003 Malicious Image
SI-4 System Monitoring Protects T1204.003 Malicious Image
SI-7 Software, Firmware, and Information Integrity Protects T1204.003 Malicious Image
SI-8 Spam Protection Protects T1204.003 Malicious Image
SR-11 Component Authenticity Protects T1204.003 Malicious Image
SR-4 Provenance Protects T1204.003 Malicious Image
SR-5 Acquisition Strategies, Tools, and Methods Protects T1204.003 Malicious Image
SR-6 Supplier Assessments and Reviews Protects T1204.003 Malicious Image
action.malware.variety.Downloader Downloader (pull updates or other malware) related-to T1204.003 User Execution: Malicious Image
action.malware.variety.Trojan An application which appears legitimate but hides malicious functionality. Child of 'RAT' when combined with 'Backdoor' related-to T1204.003 User Execution: Malicious Image
action.malware.variety.Unknown Unknown related-to T1204.003 User Execution: Malicious Image
action.social.variety.Phishing Any type of *ishing. Phishing always involves getting data from the victim. Phishing usually has some element of pretexting, but often it doesn’t rise to the level of an invented scenario. E.g. A fake google login page isn’t really pretexting. related-to T1204.003 User Execution: Malicious Image
action.social.variety.Pretexting Pretexting (dialogue leveraging invented scenario). Unlike 'Phishing', does not transfer data. (A fraudulent transfer or changing a bank account on a business account is not really disclosing data. related-to T1204.003 User Execution: Malicious Image
action.social.vector.Email Email related-to T1204.003 User Execution: Malicious Image
action.social.vector.Social media Social media or networking related-to T1204.003 User Execution: Malicious Image