Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.
Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
intel-tdt | Intel Threat Detection Technology | CrowdStrike AMS | T1102 | Web Service |
Comments
Intel Threat Detection Technology (TDT), combined with CrowdStrike Falcon Accelerated Memory Scanning (CAMS), enhances cybersecurity defenses by enabling faster, real-time detection of Exfiltration Over Web Services (T1102). This integrated solution strengthens CrowdStrike Falcon, improving its ability to detect and mitigate cyber threats earlier in the kill chain, while minimizing system performance impact.
Exfiltration Over Web Services (T1102) involves adversaries using web services, such as HTTP/S, SOAP, or other web protocols, to exfiltrate sensitive data from compromised systems to external servers. Attackers often leverage common web service APIs to transfer stolen data covertly, bypassing traditional security mechanisms and monitoring systems. Intel TDT provides real-time telemetry on program execution, memory access, and control flow, allowing security teams to detect abnormal behaviors, such as unusual API calls or unauthorized interactions with web service endpoints, indicative of potential data exfiltration activity.
References
|