Initial Access TA0001

Overview

The Initial Access phase in the MITRE ATT&CK framework refers to how attackers gain an initial foothold in a target environment. In Azure, this often involves abusing identity, exploiting public-facing applications, or leveraging compromised credentials to infiltrate the cloud infrastructure. Below are the core concepts of TA0001.

1. Exploiting Public-Facing Applications

Technique: T1190 - Exploit Public-Facing Application Attackers target vulnerabilities in exposed services to gain unauthorized access.

  • Azure Kubernetes Service (AKS): Leveraging misconfigured ingress controllers or exploiting known vulnerabilities in containerized applications.

2. Trusted Relationship

Technique: T1199 - Trusted Relationship The Trusted Relationship technique involves exploiting relationships or permissions granted between organizations or systems. Specifically:

  • Third-Party Access: Adversaries may compromise external entities like IT service providers, contractors, or resellers who already have access to the victim’s environment.

  • Delegated Permissions: Abuse of delegated administrative privileges in cloud environments, like Office 365 or Azure, is a prime example.

  • Insider-Like Access: The adversary leverages permissions that bypass standard external access controls, often because the trust between entities or systems is poorly scrutinized.

3. Valid Accounts

Technique: T1078 - Valid Accounts Attackers obtain or abuse credentials of existing accounts in order to complete other tactics within MITRE Att&ck.

  • T1078.001 - Default Accounts: Utilizing default account credentials in order to complete other tactics within the MITRE Att&CK framework.

  • T1078.004 - Cloud Accounts: Use stolen Entra ID tokens to access resources without MFA, such as Key Vault secrets and Blob storage.

Last updated