{ "type": "bundle", "id": "bundle--535122fb-36e3-4321-99d0-62f07de84483", "spec_version": "2.0", "objects": [ { "modified": "2022-10-20T21:20:22.578Z", "name": "Serverless", "description": "Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them.\n\nOnce acquired, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers)", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", "phase_name": "resource-development" } ], "x_mitre_detection": "", "x_mitre_platforms": [ "PRE" ], "x_mitre_is_subtechnique": true, "x_mitre_deprecated": false, "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_version": "1.0", "x_mitre_contributors": [ "Awake Security" ], "x_mitre_data_sources": [ "Internet Scan: Response Content" ], "type": "attack-pattern", "id": "attack-pattern--04a5a8ab-3bc8-4c83-95c9-55274a89786d", "created": "2022-07-08T12:39:29.684Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "revoked": false, "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/techniques/T1583/007", "external_id": "T1583.007" }, { "source_name": "AWS Lambda Redirector", "description": "Adam Chester. (2020, February 25). AWS Lambda Redirector. Retrieved July 8, 2022.", "url": "https://blog.xpnsec.com/aws-lambda-redirector/" }, { "source_name": "Detecting Command & Control in the Cloud", "description": "Gary Golomb. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved July 8, 2022.", "url": "https://awakesecurity.com/blog/threat-hunting-series-detecting-command-control-in-the-cloud/" }, { "source_name": "BlackWater Malware Cloudflare Workers", "description": "Lawrence Abrams. (2020, March 14). BlackWater Malware Abuses Cloudflare Workers for C2 Communication. Retrieved July 8, 2022.", "url": "https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }