Cloud Services
Adversaries may log into accessible cloud services within a compromised environment using [Valid Accounts](https://attack.mitre.org/techniques/T1078) that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user. Many enterprises federate centrally managed user identities to cloud services, allowing users to login with their domain credentials in order to access the cloud control ...
BY SOURCE
PROCEDURES (9)
Auto-extracted: 2 detections for remote
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for cloud monitoring
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for exfiltrat