CDNs - T1596.004 (91177e6d-b616-4a03-ba4b-f3b32f7dda75)
Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow an organization to host content from a distributed, load balanced array of servers. CDNs may also allow organizations to customize content delivery based on the requestor’s geographical region.
Adversaries may search CDN data to gather actionable information. Threat actors can use online resources and lookup tools to harvest information about content servers within a CDN. Adversaries may also seek and target CDN misconfigurations that leak sensitive information not intended to be hosted and/or do not have the same protection mechanisms (ex: login portals) as the content hosted on the organization’s website.(Citation: DigitalShadows CDN) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: Active Scanning or Search Open Websites/Domains), establishing operational resources (ex: Acquire Infrastructure or Compromise Infrastructure), and/or initial access (ex: Drive-by Compromise).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Search Open Technical Databases - T1596 (55fc4df0-b42c-479a-b860-7a6761bcaad0) | Attack Pattern | CDNs - T1596.004 (91177e6d-b616-4a03-ba4b-f3b32f7dda75) | Attack Pattern | 1 |