Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to compromise. Firewall rules may also already exist to permit traffic to these services.
Web service providers also commonly use SSL/TLS encryption, giving adversaries an added level of protection.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-20 | Use of External Systems | Protects | T1567 | Exfiltration Over Web Service | |
AC-4 | Information Flow Enforcement | Protects | T1567 | Exfiltration Over Web Service | |
SC-7 | Boundary Protection | Protects | T1567 | Exfiltration Over Web Service | |
azure_sentinel | Azure Sentinel | technique_scores | T1567 | Exfiltration Over Web Service |
Comments
This control provides minimal coverage to both of this technique's sub-techniques as well as some of its procedure examples, resulting in an overall score of Minimal.
The Azure Sentinel Analytics "Malformed user agent" query can detect potential exfiltration over a web service by malicious code with a hard-coded user agent string, or possibly data encoded via the user agent string.
References
|
cloud_app_security_policies | Cloud App Security Policies | technique_scores | T1567 | Exfiltration Over Web Service |
Comments
This control can limit user methods to send data over web services.
References
|
cloud_app_security_policies | Cloud App Security Policies | technique_scores | T1567 | Exfiltration Over Web Service |
Comments
This control can identify large volume potential exfiltration activity, and log user activity potentially related to exfiltration via web services. A relevant alert is "Unusual file download (by user)".
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1567.002 | Exfiltration to Cloud Storage | 6 |
T1567.001 | Exfiltration to Code Repository | 6 |