Direct Cloud VM Connections (T1021.008)

View on ATT&CK

In Playbook

Associated Tactics

  • Lateral Movement

Lateral Movement (TA0008)

The adversary is trying to move through your environment. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective often involves pivoting through multiple systems and accounts to gain. Adversaries might install their own remote access tools to accomplish Lateral Movement or use legitimate credentials with native network and operating system tools, which may be stealthier.

View on ATT&CK

Procedure Examples

Description Source(s)
AWS. (2023, June 2). Connect using EC2 Instance Connect. Retrieved June 2, 2023. EC2 Instance Connect
AWS. (2023, June 2). What is AWS System Manager?. Retrieved June 2, 2023. AWS System Manager
Ian Ahl. (2023, September 20). LUCR-3: Scattered Spider Getting SaaS-y In The Cloud. Retrieved September 20, 2023. lucr-3: Getting SaaS-y in the cloud
Mandiant Intelligence. (2023, May 16). SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack. Retrieved June 2, 2023. SIM Swapping and Abuse of the Microsoft Azure Serial Console
Microsoft. (2022, October 17). Azure Serial Console. Retrieved June 2, 2023. Azure Serial Console