Impact
The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.
Techniques
Techniques: 22
ID | Name | Description | |
---|---|---|---|
T1531 | Account Access Removal |
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or perform a
System Shutdown/Reboot [MITRE]
to set malicious changes into place. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to delete IAM users. In AWS, an AWS account is a container where you can create and manage your AWS resources. An account is also a unique identity, typically associated with a user, that grants access to a specific system or resource, for example, an IAM user. Using this technique, a threat actor can delete legitimate and authorized IAM users within an AWS account, such as IAM users with administrative privileges that would otherwise be used by the AWS account holder to contain the threat actor and recover from unauthorized actions taken. Note that while it is possible for the threat actor to delete legitimate IAM users, it is not possible to delete the account root user. This technique uses the same Event names as the Indicator Removal > Delete IAM Entities technique ( iam:DeleteUser ), however, the difference is that in the Indicator Removal > Delete IAM Entities technique, a threat actor first creates the users and roles, performs unauthorized actions with the users and roles, and then deletes the previously created users and roles to remove their existence to evade defensive actions. With this technique, the roles and users that are deleted are legitimate users created by the AWS account holder. |
|
T1485 | Data Destruction |
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives. Common operating system file deletion commands such as |
|
↳ | T1485.001 | Lifecycle-Triggered Deletion |
Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:PutBucketLifecycleConfiguration APIs to delete objects and buckets within an AWS account through the use of lifecycle policies.Using this technique, a threat actor can change the lifecycle policy of an Amazon S3 bucket so that the target S3 bucket is subject to a lifecycle policy that deletes objects in the bucket after a minimum time period, typically one day. This enables threat actors to destroy data.within an AWS account, which is sometimes used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor will view information about buckets in the AWS account ( s3:ListBuckets ) and view objects in the buckets (s3:ListObjects ) prior to using lifecycle policies to delete the objects. Note that it is also possible to use other S3 actions such as the s3:DeleteObjects API to delete objects within an AWS account - the use of that and other associated APIs are described in the Data Destruction > S3 Objects and Buckets technique. |
↳ | T1485.A001 | RDS Instances and Backups |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may delete Amazon RDS backups within an AWS account to block victims from recovering their data in the event of an RDS instance or cluster deletion, and then delete the RDS instance for high impact in a victim's AWS account, typically as part of a ransomware campaign. The rds:ModifyDBCluster API is used by the threat actor to turn off deletion protection for a cluster, and the rds:ModifyDBInstance API is also used to turn off deletion protection and additionally set the backup retention period to 0, effectively removing automated snapshots.This technique is related to Cloud Database Discovery > Query RDS, as a threat actor will typically view information about RDS instances and snapshots in the AWS account ( s3:DescribeDBInstances and s3:DescribeDBSnapshots ) prior to deleting the RDS instances and snapshots. |
↳ | T1485.A003 | S3 Object and Bucket Deletion |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:DeleteBucket , s3:DeleteObject , or s3:DeleteObjects APIs to delete objects and buckets within an AWS account.Using this technique, a threat actor can delete objects and buckets within an AWS account, which is typically used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor will view information about Amazon S3 buckets in the AWS account ( s3:ListBuckets ) and view objects in the buckets (s3:ListObjects ) prior to deleting the objects. Note that it is also possible to use the s3:PutBucketLifecycleConfiguration API to delete objects within an AWS account - the use of that API is described in the Data Destruction > Lifecycle-Triggered Deletion technique. |
T1486 | Data Encrypted for Impact |
Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted. |
|
↳ | T1486.A001 | S3 Encryption - SSE-C Key Encryption |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to use the s3:CopyObject API to encrypt objects within an AWS account.Using this technique, a threat actor can use their own encryption key to encrypt the contents of a bucket, which is sometimes used as part of a ransomware campaign. This technique is related to Cloud Storage Discovery > S3 Objects and Buckets, as a threat actor may view information about buckets in the AWS account ( s3:ListBuckets ) and view objects in the buckets (s3:ListObjects ) prior to using an encryption key in their control to encrypt objects. |
T1491 | Defacement |
Adversaries may modify visual content available internally or externally to an enterprise network. Reasons for Defacement [MITRE] include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of Defacement [MITRE] in order to cause user discomfort, or to pressure compliance with accompanying messages. |
|
↳ | T1491.A001 | Subdomain Takeover |
AWS Specific ContentA prerequisite for this technique is that an organization has a resource that has been deleted or removed, but a DNS record for the resource still exists. If a threat actor is able to find this condition within an environment, they can reprovision the resource to which the DNS record points, while controlling the content displayed by the resource - this is known as a Subdomain Takeover. Normal users that browse to the resource using its DNS record will be served the content provisioned by the adversary. This tactic is also known as "Dangling DNS" abuse. While the resource creation will have associated API calls, these are typically performed within an AWS account in control of the threat actor, and API calls will be hidden from the victim. |
T1578 | Modify Cloud Compute Infrastructure |
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. |
|
↳ | T1578.002 | Create Cloud Instance |
An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may
Create Snapshot [MITRE]
of one or more volumes in an account, create a new instance, mount the snapshots, and then apply a less restrictive security policy to collect
Data from Local System [MITRE]
or for
Remote Data Staging [MITRE]
. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can create a new computing instance to hijack resources or evade defenses. Creating a new instance may also allow a threat actor to carry out unauthorized activity within an environment without affecting the execution of current running instances. |
↳ | T1578.001 | Create Snapshot |
An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions that prevent access to existing compute service infrastructure, unlike in
Revert Cloud Instance [MITRE]
where an adversary may revert to a snapshot to evade detection and remove evidence of their presence. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may create an Amazon EBS snapshot of an Amazon EBS volume to create a point-in-time backup of that volume as a way to exfiltrate the snapshot. Threat actors can also create a snapshot of an EC2 instance, use the EC2 instance to perform unauthorized actions, then revert to a snapshot to evade detection and remove evidence of previously performed unauthorized actions on the EC2 instance. |
↳ | T1578.003 | Delete Cloud Instance |
An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can delete a cloud instance after they have performed unauthorized actions on the instance in an attempt to evade detection and remove evidence of their activity. Deleting an instance can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. Additionally, threat actors and insider threats can delete cloud instances within an AWS account, causing destructive impact to the AWS account holder. |
↳ | T1578.005 | Modify Cloud Compute Configurations |
Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victims compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their activities to the victim. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can modify settings that directly affect the size and resources available to cloud compute infrastructure in order to evade defenses or increase their ability to consume resources, such as changing the instance type or CPU and memory configuration. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow threat actors to abuse the victims compute resources to achieve their goals. |
T1496 | Resource Hijacking |
Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability. |
|
↳ | T1496.004 | Cloud Service Hijacking |
Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, which may impact hosted service availability. |
↳ | T1496.A007 | Cloud Service Hijacking - Bedrock LLM Abuse |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. Amazon Bedrock is a fully managed service that makes high-performing foundation models (FMs) and LLMs (Large Language Models) from leading AI companies and Amazon available for use through a unified API. Using this technique, a threat actor can send prompts to LLMs that are hosted on Amazon Bedrock. The threat actor can then trade or sell access to the LLMs for use by other entities while the compromised AWS account holder would be responsible for paying the usage charges. |
↳ | T1496.A001 | Cloud Service Hijacking - SES Messaging |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the Event Name(s) section Using this technique, if a threat actor has access to an AWS identity in an AWS account where production access to SES is enabled (ie. the AWS account has been moved out of the Amazon SES sandbox) and the credentials have sufficient permissions to send email messages with SES, then the threat actor can take advantage of this access by sending spam emails or emails containing malicious content from the AWS account. |
↳ | T1496.001 | Compute Hijacking |
Unreleased. TBD |
↳ | T1496.A008 | Compute Hijacking - EC2 Use |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the action in the Event Name(s) section With access to an AWS identity that has the appropriate permissions, threat actors can create a new computing instance to hijack resources or evade defenses. Creating a new instance may also allow a threat actor to carry out unauthorized activity within an environment without affecting the execution of current running instances. This technique is related to the Modify Cloud Compute Infrastructure > Create Cloud Instance technique and is used to additionally identify what type of cloud instance was created. |
↳ | T1496.A006 | Compute Hijacking - ECS |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to access or create Amazon ECS resources.Using this technique, a threat actor can use Amazon ECS resources for their computation requirements with the cost of the resources being attributed to the compromised account. Threat actors can either hijack an existing ECS container or create ECS containers or clusters for this purpose. This technique is related to the Modify Cloud Compute Infrastructure > Create Cloud Instance technique and is used to additionally identify what type of cloud instance was created. |
↳ | T1496.003 | SMS Pumping |
Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability. SMS pumping is a type of telecommunications fraud whereby a threat actor first obtains a set of phone numbers from a telecommunications provider, then leverages a victims messaging infrastructure to send large amounts of SMS messages to numbers in that set. By generating SMS traffic to their phone number set, a threat actor may earn payments from the telecommunications provider. AWS Specific ContentA prerequisite for this technique is that a threat actor has identified an Amazon Cognito environment that is not protected by WAF or Protect Configurations SMS Pumping is a type of telecommunications fraud where a threat actor purchases a block of high-rate phone numbers from a telecom provider and then coerces unsuspecting services into sending SMS messages to those numbers. An unauthorized user can abuse the SMS and text messaging capability of Amazon Cognito's user pool sign up process to send a high volume of SMS messages to the telecom provider. |