Latest from the Labs
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan
Heading
Imagine that you’re a SOC (Security Operations Center) analyst receiving an alert about suspicious behavior from a binary on an EC2 instance. After checking the binary on VirusTotal, you find it was an AWS-developed software signed by Amazon. Further investigation reveals that it communicated only with Amazon-owned IP addresses.
Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive
Heading
Mitiga's advisory highlights critical gaps in forensic visibility with Google Drive's Basic license, affecting security and incident investigations. Read on.
How Okta Passwords Can Be Compromised: Uncovering a Risk to User Data
Heading
Mitiga's research team uncovered a data risk to Okta users due to passwords that can be present in logs. This article outlines the risk and attack method.
Google Cloud Platform Exfiltration: A Threat Hunting Guide
Heading
If you’re wondering if the cloud era is here, you need only look at the latest stats. 67% of enterprise infrastructure is now cloud-based and 94% of enterprises use cloud services.1 It’s no wonder that public clouds like Google Cloud Platform (GCP) have become a new playground for threat actors. There is a lot to exploit.
Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage
Heading
As part of Mitiga’s continuous research into cloud attacks and forensics, we have been examining potential data exfiltration techniques in GCP (Google Cloud Platform) and how to identify and investigate them. During this research, we discovered a significant forensic security deficiency in Google Cloud Storage that enables a threat actor to exfiltrate in a covert manner.
Guide: CircleCI Breach Cybersecurity Incident Hunting Guide
Heading
Learn how to investigate the CircleCI breach with Mitiga’s technical guide to assist organizational threat hunting efforts.
If It Scares You, It Might Be Good to Try — Monorepo and Dynamically Configured CI
Heading
In this blog, Mitiga Devops Engineer Stav Ochakovski addresses our organizational monorepo shift and why it triggered a CI adjustment, as well.
Elastic IP Hijacking — A New Attack Vector in AWS
Heading
Read Mitiga research about a new post-exploitation attack method, a new way that enables adversaries to hijack public IP addresses for malicious purposes.
Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots
Heading
A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.