Collection TA0009
Overview
In Azure environments, TA0009 – Collection refers to the stage where attackers, after gaining access, begin harvesting sensitive data such as secrets, credentials, configurations, storage contents, and database records. Leveraging Azure-native services like Key Vault, Blob Storage, Azure SQL, and DevOps Repos, adversaries may use legitimate APIs and tools (e.g., Azure CLI, SDKs, or Automation Runbooks) to automate data collection. Common tactics include enumerating all secrets in a Key Vault, dumping blob contents using stolen SAS tokens, extracting credentials from pipeline variables or configuration files, and staging collected data in attacker-controlled or compromised storage accounts. These techniques often blend in with normal cloud operations, making them harder to detect unless proper logging, anomaly detection, and least-privilege access models are in place.
T1119 – Automated Collection
Adversaries abuse Azure Automation, Logic Apps, and Functions to script the collection of data.
Attack Examples:
Create a malicious runbook to collect and exfiltrate Key Vault secrets:
Abuse Logic Apps to pull data from SharePoint, Outlook, or SQL DB:
Use Azure Functions as persistent backdoors to automate dumps:
T1530 – Data from Cloud Storage Object
Adversaries access Azure Storage (Blobs, Queues, Files) to collect sensitive data.
Attack Examples:
Use stolen keys or tokens to list and download blob contents:
Abuse misconfigured public blobs:
Extract files from File Shares (if SMB access is allowed):
T1213 – Data from Information Repositories
Includes:
T1213.001 – Databases
T1213.003 – Code Repositories
💥 Attack Examples:
T1213.001 – Azure SQL / Cosmos DB / Table Storage:
Query sensitive data post-compromise:
Abuse leaked connection strings from
local.settings.json
or pipeline variables:
T1213.003 – Azure DevOps:
Clone Git repos to extract hardcoded secrets, tokens:
Pull pipeline secrets and variables:
Search repos for secrets:
T1074.002 – Data Staged: Cloud Storage (Remote Data Staging)
Adversaries temporarily stage stolen data in cloud storage to prep for exfil.
💥 Attack Examples:
Upload collected loot to attacker-controlled Azure Storage:
Use compromised internal storage account as a staging area to blend in:
Abuse Azure Functions or Logic Apps to write staged data:
✅ Summary Table
T1119 Automated Collection
Automation Runbooks, Logic Apps, Azure Functions harvesting secrets
T1530 Cloud Storage Object
Blob listing/downloading via stolen keys or public blobs
T1213.001 DB Repositories
SQL/Cosmos DB queries with stolen creds or tokens
T1213.003 Code Repos
Clone repos, extract secrets from Azure DevOps/GitHub
T1074.002 Remote Data Staging
Upload loot to Azure Storage for exfil or persistence
Last updated