Skip to content

T1585.003 Cloud Accounts

Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, MEGA, Microsoft OneDrive, or AWS S3 buckets for Exfiltration to Cloud Storage or to Upload Tools. Cloud accounts can also be used in the acquisition of infrastructure, such as Virtual Private Servers or Serverless infrastructure. Establishing cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.1

Creating Cloud Accounts may also require adversaries to establish Email Accounts to register with the cloud provider.

Item Value
ID T1585.003
Sub-techniques T1585.001, T1585.002, T1585.003
Tactics TA0042
Platforms PRE
Version 1.1
Created 27 May 2022
Last Modified 25 October 2022


ID Mitigation Description
M1056 Pre-compromise This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.