August 2, 2023
More on Abusing the Amazon Web Services SSM Agent as a Remote Access TrojanImagine that you’re a SOC (Security Operations Center) analyst receiving an alert about suspicious behavior from a binary on an EC2 instance. After checking the binary on VirusTotal, you find it was an AWS-developed software signed by Amazon. Further investigation reveals that it communicated only with Amazon-owned IP addresses.
August 2, 2023
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan Mitiga's research discovered a significant new post-exploitation security concept: involving the use of Systems Manager (SSM) agent as a Remote Access Trojan (RAT) on Linux and Windows machines, controlling them using another AWS account. We shared our research with the AWS security team and included some of their feedback to this advisory.
June 1, 2023
Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google DriveAfter gaining initial access to any platform, data theft (exfiltration) is one of the most common attack vectors used by threat actors.
March 23, 2023
How Okta Passwords Can Be Compromised: Uncovering a Risk to User DataMitiga's research team uncovered a data risk to Okta users due to passwords that can be present in logs. This article outlines the risk and attack method.
December 21, 2022
Elastic IP Hijacking — A New Attack Vector in AWSMitiga Researchers found a new post-exploitation attack method, a novel way in AWS that may enable adversaries to hijack static public IP addresses for malicious purposes.
September 19, 2022
Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?
July 20, 2022
How Can Transit Gateway VPC Flow Logs Help My Incident & Response Readiness?In this blog, we will focus on the security and forensic aspects of Transit Gateway VPC flow logs and expand the way they can be used by organizations to respond to cloud incidents.
December 14, 2021
Log4Shell - identify vulnerable external-facing workloads in AWSCloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.