More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan

Heading

Imagine that you’re a SOC (Security Operations Center) analyst receiving an alert about suspicious behavior from a binary on an EC2 instance. After checking the binary on VirusTotal, you find it was an AWS-developed software signed by Amazon. Further investigation reveals that it communicated only with Amazon-owned IP addresses.

Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive

Heading

Mitiga's advisory highlights critical gaps in forensic visibility with Google Drive's Basic license, affecting security and incident investigations. Read on.

How Okta Passwords Can Be Compromised: Uncovering a Risk to User Data

Heading

Mitiga's research team uncovered a data risk to Okta users due to passwords that can be present in logs. This article outlines the risk and attack method.

Google Cloud Platform Exfiltration: A Threat Hunting Guide

Heading

If you’re wondering if the cloud era is here, you need only look at the latest stats. 67% of enterprise infrastructure is now cloud-based and 94% of enterprises use cloud services.1 It’s no wonder that public clouds like Google Cloud Platform (GCP) have become a new playground for threat actors. There is a lot to exploit.

Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage

Heading

As part of Mitiga’s continuous research into cloud attacks and forensics, we have been examining potential data exfiltration techniques in GCP (Google Cloud Platform) and how to identify and investigate them. During this research, we discovered a significant forensic security deficiency in Google Cloud Storage that enables a threat actor to exfiltrate in a covert manner.

Guide: CircleCI Breach Cybersecurity Incident Hunting Guide

Heading

Learn how to investigate the CircleCI breach with Mitiga’s technical guide to assist organizational threat hunting efforts.

If It Scares You, It Might Be Good to Try — Monorepo and Dynamically Configured CI

Heading

In this blog, Mitiga Devops Engineer Stav Ochakovski addresses our organizational monorepo shift and why it triggered a CI adjustment, as well.

Elastic IP Hijacking — A New Attack Vector in AWS

Heading

Read Mitiga research about a new post-exploitation attack method, a new way that enables adversaries to hijack public IP addresses for malicious purposes.

Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots

Heading

A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.