EXPLORE
← Back to Explore
T1578

Modify Cloud Compute Infrastructure

An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary...

IaaS
16
Detections
2
Sources
0
Threat Actors

BY SOURCE

15elastic1sigma

PROCEDURES (14)

Cloud3 detections

Auto-extracted: 3 detections for cloud

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

C21 detections

Auto-extracted: 1 detections for c2

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Bypass1 detections

Auto-extracted: 1 detections for bypass

Persist1 detections

Auto-extracted: 1 detections for persist

Persist1 detections

Auto-extracted: 1 detections for persist

Bypass1 detections

Auto-extracted: 1 detections for bypass

Aws1 detections

Auto-extracted: 1 detections for aws

Azure1 detections

Auto-extracted: 1 detections for azure

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

C21 detections

Auto-extracted: 1 detections for c2

Cloud1 detections

Auto-extracted: 1 detections for cloud

DETECTIONS (16)