EXPLORE
← Back to Explore
T1136.003

Cloud Account

Adversaries may create a cloud account to maintain access to victim systems. With a sufficient level of access, such accounts may be used to establish secondary credentialed access that does not require persistent remote access tools to be deployed on the system.(Citation: Microsoft O365 Admin Roles)(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: AWS Create IAM User)(Citation: GCP Create Cloud Identity Users)(Citation: Microsoft Azure AD Users) In addition to user a...

IaaSSaaSOffice SuiteIdentity Provider
30
Detections
3
Sources
2
Threat Actors

BY SOURCE

19splunk_escu8elastic3sigma

PROCEDURES (18)

Cloud3 detections

Auto-extracted: 3 detections for cloud

Azure3 detections

Auto-extracted: 3 detections for azure

Oauth3 detections

Auto-extracted: 3 detections for oauth

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Persist2 detections

Auto-extracted: 2 detections for persist

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Bypass2 detections

Auto-extracted: 2 detections for bypass

Credential2 detections

Auto-extracted: 2 detections for credential

Api2 detections

Auto-extracted: 2 detections for api

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Aws1 detections

Auto-extracted: 1 detections for aws

Cloud1 detections

Auto-extracted: 1 detections for cloud

Service1 detections

Auto-extracted: 1 detections for service

Privilege1 detections

Auto-extracted: 1 detections for privilege

Persist1 detections

Auto-extracted: 1 detections for persist

Office1 detections

Auto-extracted: 1 detections for office

Azure1 detections

Auto-extracted: 1 detections for azure

THREAT ACTORS (2)

DETECTIONS (30)