EXPLORE
← Back to Explore
T1578.005

Modify Cloud Compute Configurations

Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victim’s compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their ac...

IaaS
15
Detections
2
Sources
0
Threat Actors

BY SOURCE

14elastic1splunk_escu

PROCEDURES (12)

C23 detections

Auto-extracted: 3 detections for c2

Cloud2 detections

Auto-extracted: 2 detections for cloud

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Persist1 detections

Auto-extracted: 1 detections for persist

C21 detections

Auto-extracted: 1 detections for c2

Aws1 detections

Auto-extracted: 1 detections for aws

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Service1 detections

Auto-extracted: 1 detections for service

Cloud1 detections

Auto-extracted: 1 detections for cloud

Persist1 detections

Auto-extracted: 1 detections for persist

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

DETECTIONS (15)