Modify Cloud Resource Hierarchy (T1666)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Modify Cloud Resource Hierarchy

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
AWS. (n.d.). Terminology and concepts for AWS Organizations. Retrieved September 25, 2024. AWS Organizations
Ben Fletcher and Steve de Vera. (2024, June). New tactics and techniques for proactive threat detection. Retrieved September 25, 2024. AWS RE:Inforce Threat Detection 2024
Dor Edry. (2022, August 24). Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps. Retrieved September 5, 2023. Microsoft Subscription Hijacking 2022
Microsoft Azure. (2024, May 31). Organize your Azure resources effectively. Retrieved September 25, 2024. Microsoft Azure Resources
Microsoft Threat Intelligence. (2023, September 14). Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets. Retrieved September 18, 2023. Microsoft Peach Sandstorm 2023