cloud snooping

Threat Hunting for Cloud Snooping Attack

A cloud snooping attack refers to unauthorized monitoring, access, or manipulation of cloud resources to exfiltrate data or compromise services. Attackers often exploit vulnerabilities, misconfiguration, or weak access controls to infiltrate cloud environments. These attacks can involve techniques like DNS tunneling, API misuse, or leveraging legitimate communication protocols (e.g., HTTP/HTTPS) to evade detection.

Cloud snooping targets sensitive assets, such as logs, databases, or storage buckets, often using Command and Control (C2) communication channels to maintain persistence. Attackers may manipulate firewall rules, create backdoor, or use scheduled tasks for continuous access. The attack blends with normal cloud activity, making detection challenging.

Such attacks can result in data breaches, financial loss, or disrupted services. Effective defense requires cloud monitoring, log analysis (e.g., AWS CloudTrail, Azure Activity Logs, Google Cloud Audit Logs), and enforcing security best practices, including strong access controls and anomaly detection.

Cloud Snooping Attack Hunting

TTPDescriptionCloud Log Sources RequiredMITRE ATT&CK MappingWhat to Check in Logs
C2 Communication via Legitimate ProtocolsUses legitimate protocols (e.g., HTTP/HTTPS, DNS) for Command and Control (C2) communication, blending with normal traffic.– AWS VPC Flow Logs– T1071.001: Application Layer Protocol (HTTP/HTTPS)– Repeated outbound traffic to suspicious IPs/domains
– Azure NSG Flow Logs– T1071.004: DNS Communication– High DNS query volumes to uncommon or long domain names.
– Google Cloud VPC Logs
– DNS Logs
Beaconing TrafficPeriodic or irregular small data packets sent to C2 servers to maintain communication.– AWS VPC Flow Logs– T1105: Ingress Tool Transfer– Outbound connections at regular intervals
– Azure Traffic Analytics– T1071.001: Application Layer Protocol– Low data transfer volumes to the same destination over time.
– Google Cloud VPC Logs
Firewall Rule ManipulationModifies firewall rules to allow unauthorized access or bypass restrictions.– AWS Security Group Logs– T1562.004: Impair Defenses: Disable or Modify System Firewall– New rules allowing traffic from 0.0.0.0/0 or unusual IP ranges
– Azure NSG Logs– Sudden changes to inbound/outbound traffic rules.
– Google Cloud Firewall Logs
Unauthorized API CallsAbuses cloud APIs to modify configurations or access resources.– AWS CloudTrail Logs– T1569.002: System Services: API Calls– API calls from unfamiliar IPs or service accounts
– Azure Activity Logs– T1098: Account Manipulation– Modifications to permissions, IAM roles, or policies.
– Google Cloud Audit Logs
DNS TunnelingEncodes data in DNS queries to exfiltrate information or send commands to C2.– AWS Route 53 Logs– T1071.004: DNS Communication– DNS queries with long, encoded domain names
– Azure DNS Logs– T1568.002: DNS Tunneling– High frequency of DNS requests to uncommon domains.
– Google Cloud DNS Logs
Persistence via Scheduled TasksMaintains access by creating scheduled tasks or cron jobs.– AWS CloudTrail Logs– T1053.003: Scheduled Task/Job – Cron– Creation of new tasks with unexpected execution scripts
– Azure Activity Logs– Modifications to existing schedules or automation.
– Google Cloud Audit Logs
Data Exfiltration via Cloud StorageTransfers sensitive data from storage buckets to external locations.– AWS S3 Access Logs– T1048: Exfiltration Over Alternative Protocol– Large or unusual file transfers from storage
– Azure Blob Storage Logs– T1020: Automated Exfiltration– Access by unknown users or service accounts.
– Google Cloud Storage Logs
Anomalous Traffic PatternsExhibits traffic spikes, sudden large data transfers, or irregular access patterns.– AWS VPC Flow Logs– T1071.001: Application Layer Protocol– Large outbound data volumes
– Azure Traffic Analytics– T1571: Non-Standard Port– Unusual ports or protocols used for traffic.
– Google Cloud VPC Logs

Descriptions of Cloud Snooping TTPs

  1. C2 Communication via Legitimate Protocols: Attackers use common protocols like HTTP/HTTPS and DNS to establish Command and Control (C2) communication, blending into normal traffic.
  2. Beaconing Traffic: Periodic or jittered small data packets are sent to C2 servers to maintain communication or receive instructions.
  3. Bacon Pattern:- 📍Pattern :- 3 (3 S3) — 2(2 S2) — 4(4 S4)
     📍 3 sets (3 event per second) — 2 sets (2 event per second) — 4 sets (4 event per second)
     📍S3 / S2 / S4 it is sleep period of 3 / 2 / 4 seconds ( Sleep Time :- It is a gap in seconds between each set that are generating pattern of events)
  4. Firewall Rule Manipulation: Firewall rules are modified to enable traffic from unauthorized sources, allowing attackers to bypass security controls.
  5. Unauthorized API Calls: Attackers misuse cloud APIs to modify configurations, escalate privileges, or maintain control over cloud resources.
  6. DNS Tunneling: DNS queries are used to encode and transmit data or commands, evading traditional traffic monitoring.
  7. Persistence via Scheduled Tasks: Tasks or cron jobs are created to automate malicious activities or maintain access after initial compromise.
  8. Data Exfiltration via Cloud Storage: Sensitive data is extracted from cloud storage to external locations, often leveraging legitimate storage APIs.
  9. Anomalous Traffic Patterns: Traffic spikes or irregularities indicate potential exfiltration, reconnaissance, or lateral movement within the cloud environment.

Attributes and Indicators by Cloud Provider

1. AWS (Amazon Web Services)

  • CloudTrail Logs:
    • Look for unusual API calls like StartInstances, PutBucketPolicy, or InvokeFunction.
    • Check for access to sensitive resources from unexpected IPs or regions.
  • VPC Flow Logs:
    • Identify outbound traffic to suspicious IPs/domains.
    • Monitor for consistent traffic patterns indicative of beaconing.
  • Route 53 Logs:
    • Track DNS queries with long subdomain names or high query volumes.
  • S3 Access Logs:
    • Monitor large uploads or downloads (PutObject, GetObject) to/from unfamiliar buckets.

2. Azure

  • Activity Logs:
    • Detect resource modification events like UpdateSecurityRule or Set-AzFirewallPolicy.
    • Look for unusual REST API calls from unknown service principals.
  • NSG Logs:
    • Identify new rules allowing wide IP ranges or critical ports. 2020, 6060, 7070, 8080, 9999, 2080/TCP, 2053/TCP and 10443/TCP
  • DNS Logs:
    • Monitor high-frequency DNS queries or encoded subdomains.
  • Blob Storage Logs:
    • Track PutBlob and GetBlob events for bulk data transfers.

3. Google Cloud

  • Audit Logs:
    • Check for unauthorized changes to IAM roles or policies.
    • Monitor excessive storage.objects.get or compute.instances.start API calls.
  • VPC Flow Logs:
    • Analyze traffic spikes or connections to non-standard ports. 2020, 6060, 7070, 8080, 9999, 2080/TCP, 2053/TCP and 10443/TCP
  • Cloud DNS Logs:
    • Identify DNS queries with encoded data or suspicious domain patterns.
  • Cloud Storage Logs:
    • Review storage.objects.copy or storage.objects.insert for large file movements.
Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image