Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Analyze "ransomware in the cloud" post #568

Open
christophetd opened this issue Sep 10, 2024 · 1 comment
Open

Analyze "ransomware in the cloud" post #568

christophetd opened this issue Sep 10, 2024 · 1 comment

Comments

@christophetd
Copy link
Contributor

https://blog.eclecticiq.com/ransomware-in-the-cloud-scattered-spider-targeting-insurance-and-financial-industries

@lsass-exe
Copy link
Contributor

This is my first attempt at this so please be patient :)

Requires coverage:
Execution/Exfiltration: Data Factory to remotely execute commands, transfer data and maintain persistence
Persistence/Defense evasion: Abuse of Cross-Tenant Synchronization in Microsoft Entra ID [1]
Persistence/Defense evasion: Abuse of Federated Identity Providers [2]
Persistence/Defense evasion: Remove MFA within Entra ID
Execution/Persistence/Defense Evasion: Creation of new VMs to bypass security tooling [3]

Pending creation:
Execution: Abuse Azure Special Administration Console (pending issue see - Serial Console - #533 )
Execution: Google Cloud Startup Script (pending issue - #537)

Current coverage:
Execution: Azure RunCommands (coverage - https://stratus-red-team.cloud/attack-techniques/azure/azure.execution.vm-run-command/)
Execution: AWS SSM RunShellScripts (coverage - https://stratus-red-team.cloud/attack-techniques/AWS/aws.execution.ssm-send-command/)

[1, 2] I am not sure the feasibility of doing any of these programmatically, however these two may create the most issues/headaches due to licensing and dependencies on an external domain.

[3] There is indirect coverage for this via other techniques (ie anything that requires a VM) however nothing specific from what I could see. An organisation would likely want to audit and alert on any VM created where a golden base image was not used (ie a base image where security tooling was not pre-configured)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants