Modify Cloud Compute Configurations
Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victim’s compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their ac...
BY SOURCE
PROCEDURES (12)
Auto-extracted: 3 detections for c2
Auto-extracted: 2 detections for cloud
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for encrypt