Cloud Accounts
Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private S...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 4 detections for unusual
Auto-extracted: 4 detections for persist
Auto-extracted: 4 detections for credential
Auto-extracted: 3 detections for lateral
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 3 detections for bypass
Auto-extracted: 2 detections for spray
Auto-extracted: 2 detections for azure
Auto-extracted: 2 detections for encrypt
Auto-extracted: 2 detections for api
Auto-extracted: 2 detections for service
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for authentication monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for privilege