EXPLORE
← Back to Explore
T1580

Cloud Infrastructure Discovery

An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a <code>DescribeInstances</code> API...

IaaS
24
Detections
3
Sources
2
Threat Actors

BY SOURCE

18elastic5splunk_escu1sigma

PROCEDURES (15)

Brute Force3 detections

Auto-extracted: 3 detections for brute force

Azure3 detections

Auto-extracted: 3 detections for azure

Aws2 detections

Auto-extracted: 2 detections for aws

Api2 detections

Auto-extracted: 2 detections for api

Privilege2 detections

Auto-extracted: 2 detections for privilege

C22 detections

Auto-extracted: 2 detections for c2

Evasion2 detections

Auto-extracted: 2 detections for evasion

Api1 detections

Auto-extracted: 1 detections for api

Unusual1 detections

Auto-extracted: 1 detections for unusual

Api1 detections

Auto-extracted: 1 detections for api

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

C21 detections

Auto-extracted: 1 detections for c2

Evasion1 detections

Auto-extracted: 1 detections for evasion

Lateral1 detections

Auto-extracted: 1 detections for lateral

Lateral1 detections

Auto-extracted: 1 detections for lateral

DETECTIONS (24)