T1537: Transfer Data to Cloud Account

Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service.

A defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider. Such transfers may utilize existing cloud provider APIs and the internal address space of the cloud provider to blend into normal traffic or avoid data transfers over external network interfaces.

Adversaries may also use cloud-native mechanisms to share victim data with adversary-controlled cloud accounts, such as creating anonymous file sharing links or, in Azure, a shared access signature (SAS) URI.

Incidents have been observed where adversaries have created backups of cloud instances and transferred them to separate accounts.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

Monitoring of AWS CloudTrail events PutBucketLogging, PutBucketWebsite, PutEncryptionConfiguration, PutLifecycleConfiguration, PutReplicationConfiguration, ReplicateObject, RestoreObject, and ModifySnapshotAttribute (event source is ec2.amazonaws.com), CreateInstanceExportTask (event source is ec2.amazonaws.com) where errorMessage/errorCode contains the * symbol and responseElements contains 'Failure'.

Expert Required. The technique is detected only with the combination of «PT Product + Expert»

Detection

IDDS0010Data source and componentCloud Storage: Cloud Storage ModificationDescription

Monitor for anomalous file transfer activity between accounts and/or to untrusted/unexpected VPCs.

IDDS0020Data source and componentSnapshot: Snapshot CreationDescription

Monitor account activity for attempts to create and share data, such as snapshots or backups, with untrusted or unusual accounts.

IDDS0020Data source and componentSnapshot: Snapshot ModificationDescription

Monitor account activity for attempts to share data, snapshots, or backups with untrusted or unusual accounts on the same cloud service provider. Monitor for anomalous file transfer activity between accounts and to untrusted VPCs.

IDDS0015Data source and componentApplication Log: Application Log ContentDescription

Monitor logs for SaaS applications to detect instances of data being shared inappropriately. For example, in Microsoft 365, file sharing events will appear in Audit logs under the event names SharingInvitationCreated, AnonymousLinkCreated, SecureLinkCreated, or AddedToSecureLink, with TargetUserOrGroupType being Guest. In Google Workspace, externally shared files will have a Visibility property of Shared externally in the Drive audit logs.

IDDS0010Data source and componentCloud Storage: Cloud Storage MetadataDescription

Periodically baseline cloud storage infrastructure to identify malicious modifications or additions.

IDDS0020Data source and componentSnapshot: Snapshot MetadataDescription

Periodically baseline snapshots to identify malicious modifications or additions.

IDDS0029Data source and componentNetwork Traffic: Network Traffic ContentDescription

Monitor network traffic content for evidence of data exfiltration, such as gratuitous or anomalous internal traffic containing collected data. Consider correlation with process monitoring and command lines associated with collection and exfiltration.

IDDS0010Data source and componentCloud Storage: Cloud Storage CreationDescription

Monitor account activity for attempts to create and share data, such as snapshots or backups, with untrusted or unusual accounts.

Mitigation

IDM1057NameData Loss PreventionDescription

Data loss prevention can prevent and block sensitive data from being shared with individuals outside an organization.

IDM1054NameSoftware ConfigurationDescription

Configure appropriate data sharing restrictions in cloud services. For example, external sharing in Microsoft SharePoint and Google Drive can be turned off altogether, blocked for certain domains, or restricted to certain users.

IDM1037NameFilter Network TrafficDescription

Implement network-based filtering restrictions to prohibit data transfers to untrusted VPCs.

IDM1018NameUser Account ManagementDescription

Limit user account and IAM policies to the least privileges required.