Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

Techniques

Techniques: 22
ID Name Description
T1531 Account Access Removal

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or perform a System Shutdown/Reboot [MITRE] to set malicious changes into place.

In Windows, Net [MITRE] utility, Set-LocalUser and Set-ADAccountPassword PowerShell [MITRE] cmdlets may be used by adversaries to modify user accounts. In Linux, the passwd utility may be used to change passwords. Accounts could also be disabled by Group Policy.

Adversaries who use ransomware or similar attacks may first perform this and other Impact behaviors, such as Data Destruction [MITRE] and Defacement [MITRE] , in order to impede incident response/recovery before completing the Data Encrypted for Impact [MITRE] objective.



AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to delete IAM users.

In AWS, an AWS account is a container where you can create and manage your AWS resources. An account is also a unique identity, typically associated with a user, that grants access to a specific system or resource, for example, an IAM user. Using this technique, a threat actor can delete legitimate and authorized IAM users within an AWS account, such as IAM users with administrative privileges that would otherwise be used by the AWS account holder to contain the threat actor and recover from unauthorized actions taken. Note that while it is possible for the threat actor to delete legitimate IAM users, it is not possible to delete the account root user.

This technique uses the same Event names as the Indicator Removal > Delete IAM Entities technique (iam:DeleteUser), however, the difference is that in the Indicator Removal > Delete IAM Entities technique, a threat actor first creates the users and roles, performs unauthorized actions with the users and roles, and then deletes the previously created users and roles to remove their existence to evade defensive actions. With this technique, the roles and users that are deleted are legitimate users created by the AWS account holder.
i

T1485 Data Destruction

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives. Common operating system file deletion commands such as del and rm often only remove pointers to files without wiping the contents of the files themselves, making the files recoverable by proper forensic methodology. This behavior is distinct from Disk Content Wipe [MITRE] and Disk Structure Wipe [MITRE] because individual files are destroyed rather than sections of a storage disk or the disk's logical structure.

Adversaries may attempt to overwrite files and directories with randomly generated data to make it irrecoverable. In some cases politically oriented image files have been used to overwrite data.

To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware designed for destroying data may have worm-like features to propagate across a network by leveraging additional techniques like Valid Accounts [MITRE] , OS Credential Dumping [MITRE] , and SMB/Windows Admin Shares [MITRE] ..

In cloud environments, adversaries may leverage access to delete cloud storage, cloud storage accounts, machine images, database instances, and other infrastructure crucial to operations to damage an organization or their customers.

T1485.001 Lifecycle-Triggered Deletion

Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within.

Cloud storage buckets often allow users to set lifecycle policies to automate the migration, archival, or deletion of objects after a set period of time. If a threat actor has sufficient permissions to modify these policies, they may be able to circumvent any restrictions on the deletion of individual objects and delete all objects at once.

For example, in AWS environments, an adversary with the PutBucketLifecycleConfiguration permission may use the PutBucketLifecycle API call to apply a lifecycle policy to an S3 bucket that deletes all objects in the bucket after one day. In addition to destroying data for purposes of extortion and Financial Theft, adversaries may also perform this action on buckets storing cloud logs for Indicator Removal.

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:PutBucketLifecycleConfiguration APIs to delete objects and buckets within an AWS account through the use of lifecycle policies.

Using this technique, a threat actor can change the lifecycle policy of an Amazon S3 bucket so that the target S3 bucket is subject to a lifecycle policy that deletes objects in the bucket after a minimum time period, typically one day. This enables threat actors to destroy data.within an AWS account, which is sometimes used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor will view information about buckets in the AWS account (s3:ListBuckets) and view objects in the buckets (s3:ListObjects) prior to using lifecycle policies to delete the objects. Note that it is also possible to use other S3 actions such as the s3:DeleteObjects API to delete objects within an AWS account - the use of that and other associated APIs are described in the Data Destruction > S3 Objects and Buckets technique.

T1485.A001 RDS Instances and Backups

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors may delete Amazon RDS backups within an AWS account to block victims from recovering their data in the event of an RDS instance or cluster deletion, and then delete the RDS instance for high impact in a victim's AWS account, typically as part of a ransomware campaign. The rds:ModifyDBCluster API is used by the threat actor to turn off deletion protection for a cluster, and the rds:ModifyDBInstance API is also used to turn off deletion protection and additionally set the backup retention period to 0, effectively removing automated snapshots.

This technique is related to Cloud Database Discovery > Query RDS, as a threat actor will typically view information about RDS instances and snapshots in the AWS account (s3:DescribeDBInstances and s3:DescribeDBSnapshots) prior to deleting the RDS instances and snapshots.

T1485.A003 S3 Object and Bucket Deletion

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:DeleteBucket, s3:DeleteObject, or s3:DeleteObjects APIs to delete objects and buckets within an AWS account.

Using this technique, a threat actor can delete objects and buckets within an AWS account, which is typically used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor will view information about Amazon S3 buckets in the AWS account (s3:ListBuckets) and view objects in the buckets (s3:ListObjects) prior to deleting the objects. Note that it is also possible to use the s3:PutBucketLifecycleConfiguration API to delete objects within an AWS account - the use of that API is described in the Data Destruction > Lifecycle-Triggered Deletion technique.

T1486 Data Encrypted for Impact

Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.

In the case of ransomware, it is typical that common user files like Office documents, PDFs, images, videos, audio, text, and source code files will be encrypted (and often renamed and/or tagged with specific file markers). Adversaries may need to first employ other behaviors, such as File and Directory Permissions Modification [MITRE] or System Shutdown/Reboot [MITRE] , in order to unlock and/or gain access to manipulate these files. In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.

To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like Valid Accounts [MITRE] , OS Credential Dumping [MITRE] , and SMB/Windows Admin Shares [MITRE] . Encryption malware may also leverage Internal Defacement [MITRE] , such as changing victim wallpapers, or otherwise intimidate victims by sending ransom notes or other messages to connected printers (known as "print bombing").

In cloud environments, storage objects within compromised accounts may also be encrypted.

T1486.A001 S3 Encryption - SSE-C Key Encryption

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:CopyObject API to encrypt objects within an AWS account.

Using this technique, a threat actor can use their own encryption key to encrypt the contents of a bucket, which is sometimes used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor may view information about buckets in the AWS account (s3:ListBuckets) and view objects in the buckets (s3:ListObjects) prior to using an encryption key in their control to encrypt objects.

T1491 Defacement

Adversaries may modify visual content available internally or externally to an enterprise network. Reasons for Defacement [MITRE] include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of Defacement [MITRE] in order to cause user discomfort, or to pressure compliance with accompanying messages.

T1491.A001 Subdomain Takeover

AWS Specific Content


A prerequisite for this technique is that an organization has a resource that has been deleted or removed, but a DNS record for the resource still exists.

If a threat actor is able to find this condition within an environment, they can reprovision the resource to which the DNS record points, while controlling the content displayed by the resource - this is known as a Subdomain Takeover. Normal users that browse to the resource using its DNS record will be served the content provisioned by the adversary. This tactic is also known as "Dangling DNS" abuse. While the resource creation will have associated API calls, these are typically performed within an AWS account in control of the threat actor, and API calls will be hidden from the victim.

T1578 Modify Cloud Compute Infrastructure

An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.

Permissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary to evade detection and remove evidence of their presence.

T1578.002 Create Cloud Instance

An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may Create Snapshot [MITRE] of one or more volumes in an account, create a new instance, mount the snapshots, and then apply a less restrictive security policy to collect Data from Local System [MITRE] or for Remote Data Staging [MITRE] .

Creating a new instance may also allow an adversary to carry out malicious activity within an environment without affecting the execution of current running instances.

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors can create a new computing instance to hijack resources or evade defenses. Creating a new instance may also allow a threat actor to carry out unauthorized activity within an environment without affecting the execution of current running instances.

T1578.001 Create Snapshot

An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions that prevent access to existing compute service infrastructure, unlike in Revert Cloud Instance [MITRE] where an adversary may revert to a snapshot to evade detection and remove evidence of their presence.

An adversary may Create Cloud Instance [MITRE] , mount one or more created snapshots to that instance, and then apply a policy that allows the adversary access to the created instance, such as a firewall policy that allows them inbound and outbound SSH access.

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors may create an Amazon EBS snapshot of an Amazon EBS volume to create a point-in-time backup of that volume as a way to exfiltrate the snapshot. Threat actors can also create a snapshot of an EC2 instance, use the EC2 instance to perform unauthorized actions, then revert to a snapshot to evade detection and remove evidence of previously performed unauthorized actions on the EC2 instance.

T1578.003 Delete Cloud Instance

An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable.

An adversary may also Create Cloud Instance [MITRE] and later terminate the instance after achieving their objectives.

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors can delete a cloud instance after they have performed unauthorized actions on the instance in an attempt to evade detection and remove evidence of their activity. Deleting an instance can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. Additionally, threat actors and insider threats can delete cloud instances within an AWS account, causing destructive impact to the AWS account holder.

T1578.005 Modify Cloud Compute Configurations

Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victims compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their activities to the victim.

For example, cloud providers often limit customer usage of compute resources via quotas. Customers may request adjustments to these quotas to support increased computing needs, though these adjustments may require approval from the cloud provider. Adversaries who compromise a cloud environment may similarly request quota adjustments in order to support their activities, such as enabling additional Resource Hijacking [MITRE] without raising suspicion by using up a victims entire quota. Adversaries may also increase allowed resource usage by modifying any tenant-wide policies that limit the sizes of deployed virtual machines.

Adversaries may also modify settings that affect where cloud resources can be deployed, such as enabling Unused/Unsupported Cloud Regions [MITRE] . In Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources, or engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victims compute resources without generating logs on the victim tenant.

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors can modify settings that directly affect the size and resources available to cloud compute infrastructure in order to evade defenses or increase their ability to consume resources, such as changing the instance type or CPU and memory configuration. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow threat actors to abuse the victims compute resources to achieve their goals.

T1496 Resource Hijacking

Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability.

One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive. Servers and cloud-based systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining. Containerized environments may also be targeted due to the ease of deployment via exposed APIs and the potential for scaling mining activities by deploying or compromising multiple containers within an environment or cluster.

Additionally, some cryptocurrency mining malware kills off processes for competing malware to ensure its not competing for resources.

T1496.004 Cloud Service Hijacking

Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, which may impact hosted service availability.

Foreaxmple, adversaries may leverage email and messaging services, such as AWS Simple Email Service (SES), AWS Simple Notification Service (SNS), and Twilio, in order to send large quantities of spam / Pushing email and SMS messages. Alternatively, they may engage in LLMJacking by leveraging reverse proxies to hijack the power o fcloud-hosted AI models.

In some cases, adversaries may leverage services that the victim is already using. In others, particularly when the service is part of a larger cloud platform, they may first enable the service. Leveraging SaaS applciatios may cause the victim to incur significant financial costs, use up service quotas, and otherwise impact availability.

T1496.A007 Cloud Service Hijacking - Bedrock LLM Abuse

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section.

Amazon Bedrock is a fully managed service that makes high-performing foundation models (FMs) and LLMs (Large Language Models) from leading AI companies and Amazon available for use through a unified API. Using this technique, a threat actor can send prompts to LLMs that are hosted on Amazon Bedrock. The threat actor can then trade or sell access to the LLMs for use by other entities while the compromised AWS account holder would be responsible for paying the usage charges.

T1496.A001 Cloud Service Hijacking - SES Messaging

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the Event Name(s) section

Using this technique, if a threat actor has access to an AWS identity in an AWS account where production access to SES is enabled (ie. the AWS account has been moved out of the Amazon SES sandbox) and the credentials have sufficient permissions to send email messages with SES, then the threat actor can take advantage of this access by sending spam emails or emails containing malicious content from the AWS account.

T1496.001 Compute Hijacking

Unreleased. TBD

T1496.A008 Compute Hijacking - EC2 Use

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the action in the Event Name(s) section

With access to an AWS identity that has the appropriate permissions, threat actors can create a new computing instance to hijack resources or evade defenses. Creating a new instance may also allow a threat actor to carry out unauthorized activity within an environment without affecting the execution of current running instances.

This technique is related to the Modify Cloud Compute Infrastructure > Create Cloud Instance technique and is used to additionally identify what type of cloud instance was created.

T1496.A006 Compute Hijacking - ECS

AWS Specific Content

A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to access or create Amazon ECS resources.

Using this technique, a threat actor can use Amazon ECS resources for their computation requirements with the cost of the resources being attributed to the compromised account. Threat actors can either hijack an existing ECS container or create ECS containers or clusters for this purpose.

This technique is related to the Modify Cloud Compute Infrastructure > Create Cloud Instance technique and is used to additionally identify what type of cloud instance was created.

T1496.003 SMS Pumping

Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability. SMS pumping is a type of telecommunications fraud whereby a threat actor first obtains a set of phone numbers from a telecommunications provider, then leverages a victims messaging infrastructure to send large amounts of SMS messages to numbers in that set. By generating SMS traffic to their phone number set, a threat actor may earn payments from the telecommunications provider.

Threat actors often use publicly available web forms, such as one-time password (OTP) or account verification fields, in order to generate SMS traffic. These fields may leverage services such as Twilio, AWS SNS, and Amazon Cognito in the background In response to the large quantity of requests, SMS costs may increase and communication channels may become overwhelmed.

AWS Specific Content


A prerequisite for this technique is that a threat actor has identified an Amazon Cognito environment that is not protected by WAF or Protect Configurations

SMS Pumping is a type of telecommunications fraud where a threat actor purchases a block of high-rate phone numbers from a telecom provider and then coerces unsuspecting services into sending SMS messages to those numbers. An unauthorized user can abuse the SMS and text messaging capability of Amazon Cognito's user pool sign up process to send a high volume of SMS messages to the telecom provider.