Cloud Groups (T1069.003)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Discovery

Discovery (TA0007)

The adversary is trying to figure out your environment. Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.

View on ATT&CK

Procedure Examples

Description Source(s)
Amazon Web Services. (n.d.). Retrieved May 28, 2021. AWS Get Bucket ACL
Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023. Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022
Felch, M.. (2018, August 31). Red Teaming Microsoft Part 1 Active Directory Leaks via Azure. Retrieved October 6, 2019. Black Hills Red Teaming MS AD Azure, 2018
Google. (n.d.). Retrieved March 16, 2021. Google Cloud Identity API Documentation
Microsoft. (n.d.). az ad user. Retrieved October 6, 2019. Microsoft AZ CLI
Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019. Microsoft Msolrole
Stringer, M.. (2018, November 21). RainDance. Retrieved October 6, 2019. GitHub Raindance