Skip to content

T1102 Web Service

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.

Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).

Item Value
ID T1102
Sub-techniques T1102.001, T1102.002, T1102.003
Tactics TA0011
Platforms Linux, Windows, macOS
Permissions required User
Version 1.1
Created 31 May 2017
Last Modified 26 March 2020

Procedure Examples

ID Name Description
G0050 APT32 APT32 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads.27
S0534 Bazar Bazar downloads have been hosted on Google Docs.34
S0635 BoomBox BoomBox can download files from Dropbox using a hardcoded access token.12
S1063 Brute Ratel C4 Brute Ratel C4 can use legitimate websites for external C2 channels including Slack, Discord, and MS Teams.2
S1039 Bumblebee Bumblebee has been downloaded to victim’s machines from OneDrive.5
C0017 C0017 During C0017, APT41 used the Cloudflare services for C2 communications.40
S0335 Carbon Carbon can use Pastebin to receive C2 commands.14
S0674 CharmPower CharmPower can download additional modules from actor-controlled Amazon S3 buckets.11
S1066 DarkTortilla DarkTortilla can retrieve its primary payload from public sites such as Pastebin and Textbin.13
S0600 Doki Doki has used the dogechain.info API to generate a C2 address.17
S0547 DropBook DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.67
G1003 Ember Bear Ember Bear has used Discord’s content delivery network (CDN) to deliver malware and malicious scripts to a compromised host.26
G1011 EXOTIC LILY EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.25
G0037 FIN6 FIN6 has used Pastebin and Google Storage to host content for their operations.38
G0061 FIN8 FIN8 has used sslip.io, a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control.28
G0117 Fox Kitten Fox Kitten has used Amazon Web Services to host C2.30
G0047 Gamaredon Group Gamaredon Group has used GitHub repositories for downloaders which will be obtained by the group’s .NET executable on the compromised system.39
S0561 GuLoader GuLoader has the ability to download malware from Google Drive.8
S0601 Hildegard Hildegard has downloaded scripts from GitHub.9
G0100 Inception Inception has incorporated at least five different cloud service providers into their C2 infrastructure including CloudMe.3334
G0140 LazyScripter LazyScripter has used GitHub to host its payloads to operate spam campaigns.29
G0129 Mustang Panda Mustang Panda has used DropBox URLs to deliver variants of PlugX.24
S0198 NETWIRE NETWIRE has used web services including Paste.ee to host payloads.16
S0508 Ngrok Ngrok has been used by threat actors to proxy C2 connections to ngrok service subdomains.23
C0005 Operation Spalax During Operation Spalax, the threat actors used OneDrive and MediaFire to host payloads.41
G0106 Rocke Rocke has used Pastebin, Gitee, and GitLab for Command and Control.3637
S0546 SharpStage SharpStage has used a legitimate web service for evading detection.6
S0589 Sibot Sibot has used a legitimate compromised website to download DLLs to the victim’s machine.15
S0649 SMOKEDHAM SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links.10
G0139 TeamTNT TeamTNT has leveraged iplogger.org to send collected data back to C2.3231
G0010 Turla Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.1435
S0689 WhisperGate WhisperGate can download additional payloads hosted on a Discord channel.1920211822

Mitigations

ID Mitigation Description
M1031 Network Intrusion Prevention Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
M1021 Restrict Web-Based Content Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

Detection

ID Data Source Data Component
DS0029 Network Traffic Network Connection Creation

References


  1. Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. 

  2. Harbison, M. and Renals, P. (2022, July 5). When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors. Retrieved February 1, 2023. 

  3. Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. 

  4. Sadique, M. and Singh, A. (2020, September 29). Spear Phishing Campaign Delivers Buer and Bazar Malware. Retrieved November 19, 2020. 

  5. Merriman, K. and Trouerbach, P. (2022, April 28). This isn’t Optimus Prime’s Bumblebee but it’s Still Transforming. Retrieved August 22, 2022. 

  6. Cybereason Nocturnus Team. (2020, December 9). MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign. Retrieved December 22, 2020. 

  7. Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020. 

  8. Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021. 

  9. Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021. 

  10. FireEye. (2021, May 11). Shining a Light on DARKSIDE Ransomware Operations. Retrieved September 22, 2021. 

  11. Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022. 

  12. MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021. 

  13. Secureworks Counter Threat Unit Research Team. (2022, August 17). DarkTortilla Malware Analysis. Retrieved November 3, 2022. 

  14. Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020. 

  15. Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021. 

  16. Maniath, S. and Kadam P. (2019, March 19). Dissecting a NETWIRE Phishing Campaign’s Usage of Process Hollowing. Retrieved January 7, 2021. 

  17. Fishbein, N., Kajiloti, M.. (2020, July 28). Watch Your Containers: Doki Infecting Docker Servers in the Cloud. Retrieved March 30, 2021. 

  18. Biasini, N. et al.. (2022, January 21). Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation. Retrieved March 14, 2022. 

  19. Crowdstrike. (2022, January 19). Technical Analysis of the WhisperGate Malicious Bootloader. Retrieved March 10, 2022. 

  20. Falcone, R. et al.. (2022, January 20). Threat Brief: Ongoing Russia and Ukraine Cyber Conflict. Retrieved March 10, 2022. 

  21. MSTIC. (2022, January 15). Destructive malware targeting Ukrainian organizations. Retrieved March 10, 2022. 

  22. S2W. (2022, January 18). Analysis of Destructive Malware (WhisperGate) targeting Ukraine. Retrieved March 14, 2022. 

  23. Cimpanu, C. (2018, September 13). Sly malware author hides cryptomining botnet behind ever-shifting proxy service. Retrieved September 15, 2020. 

  24. Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022. 

  25. Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022. 

  26. Unit 42. (2022, February 25). Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot. Retrieved June 9, 2022. 

  27. Adair, S. and Lancaster, T. (2020, November 6). OceanLotus: Extending Cyber Espionage Operations Through Fake Websites. Retrieved November 20, 2020. 

  28. Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021. 

  29. Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021. 

  30. ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020. 

  31. Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved August 4, 2022. 

  32. Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021. 

  33. GReAT. (2014, December 10). Cloud Atlas: RedOctober APT is back in style. Retrieved May 8, 2020. 

  34. Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020. 

  35. Faou, M. (2020, December 2). Turla Crutch: Keeping the “back door” open. Retrieved December 4, 2020. 

  36. Anomali Labs. (2019, March 15). Rocke Evolves Its Arsenal With a New Malware Family Written in Golang. Retrieved April 24, 2019. 

  37. Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020. 

  38. McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019. 

  39. Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020. 

  40. Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022. 

  41. M. Porolli. (2021, January 21). Operation Spalax: Targeted malware attacks in Colombia. Retrieved September 16, 2022.