[Feature Request] Add Python module for detecting T1098.003 - Additional Cloud Roles #17
Open
4 tasks done
Labels
API: Admin
enhancement
New feature or request
Subtechnique: 003
Tactic: Persistence
Technique: T1098
🐍 Python Module for MITRE ATT&CK Technique Detection
Technique Name: Account Manipulation: Additional Cloud Roles
Technique ID: T1098.003
Technique Description: An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update IAM policies in cloud-based environments or add a new global administrator in Office 365 environments. With sufficient permissions, a compromised account can gain almost unlimited access to data and settings (including the ability to reset the passwords of other admins).
This account modification may immediately follow Create Account or other malicious account activity. Adversaries may also modify existing Valid Accounts that they have compromised. This could lead to privilege escalation, particularly if the roles added allow for lateral movement to additional accounts.
Describe the solution you'd like
With authentication from compromised credentials, create a new group or role within Google Workspace. Then create a new user and add the user to this new group or role. As an option from the config, it should be possible to add a default admin role as well which would be a good signal for privilege escalation.
Additional context
Checklist
Please ensure the following tasks are completed before submitting your feature request:
The text was updated successfully, but these errors were encountered: