Collection
The adversary is trying to gather data of interest for their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to steal (exfiltrate) the data. Common target sources within AWS include S3, DynamoDB, RDS, and Redshift.
Techniques
Techniques: 3
ID | Name | Description | |
---|---|---|---|
T1530 | Data from Cloud Storage |
Adversaries may access data from cloud storage. |
|
↳ | T1530.A001 | S3 Object Collection |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to retrieve objects from an Amazon S3 bucket. Using this technique, a threat actor can get objects from an Amazon S3 bucket within an AWS account. The threat actor can then use knowledge about these resources in attempts to further their objectives. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor will typically view information about buckets in the AWS account ( s3:ListBuckets ) and view objects in the buckets (s3:ListObjects ) prior to retrieving the objects. This technique is typically used by threat actors as part of a ransomware campaign. |
T1213 | Data from Information Repositories |
Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive documents with recipients outside of the organization. |
|
↳ | T1213.A013 | RDS Instance Manipulation |
AWS Specific ContentA prerequisite for this technique is that an Amazon RDS instance has been configured to be publicly accessible from the internet and has unrestricted or overly permissive VPC Security Groups assigned A threat actor can access an Amazon RDS instance to view, modify, copy, or delete data from an RDS instance. Threat actors delete databases and tables as part of extortion attempts and have created ransom notes for the victims in RDS instances through data insertion. |