EXPLORE
← Back to Explore
T1648

Serverless Execution

Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, including compute engines, application integration services, and web servers. Adversaries may abuse these resources in various ways as a means of executing arbitrary commands. For example, adversaries may use serverless functions to execute malicious code, such as crypto-mining malware (i.e. [Resource Hij...

SaaSIaaSOffice Suite
5
Detections
1
Sources
0
Threat Actors

BY SOURCE

5elastic

PROCEDURES (3)

Persist2 detections

Auto-extracted: 2 detections for persist

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Aws1 detections

Auto-extracted: 1 detections for aws

DETECTIONS (5)