Adversaries hijack trusted platforms , Dropbox, GitHub, Telegram, AWS S3 , to hide command-and-control, exfiltrate data, and distribute malware behind legitimate traffic.
MITRE ATT&CK • Sub-technique T1583.006
Web services represent one of the most insidious infrastructure acquisition techniques because they exploit the fundamental trust that organizations place in globally recognized platforms. When adversaries use Dropbox, GitHub, Telegram, AWS S3, Google Drive, or Blogspot as command-and-control channels or data exfiltration destinations, the resulting network traffic is virtually indistinguishable from legitimate business activity. This makes detection extraordinarily difficult for traditional firewalls, intrusion detection systems, and network monitoring tools that are configured to allow traffic to these trusted domains.
The economic barriers are negligible , all major web services offer free tiers that provide ample bandwidth, storage, and API access for initial reconnaissance and attack operations. Adversaries can register accounts in minutes using anonymous email addresses, VPN connections, and temporary phone numbers. Once established, these accounts serve as resilient attack infrastructure that can survive the takedown of individual domains or IP addresses. According to CISA and industry threat reports, nearly 47% of observed advanced persistent threat (APT) operations leverage at least one legitimate web service for C2 or data exfiltration, and this percentage continues to grow as organizations migrate more operations to cloud-based platforms.
The defensive challenge is compounded by the business reality that blocking access to Dropbox, Google Drive, GitHub, or Telegram would cause massive operational disruption for virtually every modern enterprise. This asymmetry , where the attacker can freely use any service, but the defender cannot block any service , gives adversaries an inherent advantage. Blocking these services is not a viable strategy; instead, organizations must invest in behavioral analytics, CASB (Cloud Access Security Broker) solutions, UEBA (User and Entity Behavior Analytics), and granular cloud access monitoring to detect the subtle anomalies that indicate abuse of web services for malicious purposes.
Traffic to legitimate web services passes through firewalls undetected. HTTPS encryption prevents deep packet inspection of C2 commands hidden within API requests.
Organizations rely on Dropbox, GitHub, Google Drive, and Telegram for daily operations. Blocking these services would halt business productivity entirely.
Free tiers provide 2-15 GB storage, unlimited API calls, and generous bandwidth. Adversaries pay nothing to establish operational infrastructure that would cost thousands in VPS hosting.
When one account is flagged and shut down, adversaries instantly create replacements. Multi-service C2 chains (GitHub + Telegram + Dropbox) provide built-in failover capability.
Temporary email addresses, VPN connections, and virtual phone numbers allow attackers to create accounts with zero identity verification, making attribution nearly impossible.
As cloud adoption accelerates, the attack surface for web service abuse grows proportionally. CASB vendors report a 78% increase in web service abuse attempts year-over-year.
Acquiring Web Services (T1583.006) refers to the adversary practice of registering accounts on legitimate, publicly available web-based platforms , such as cloud storage services, code repositories, social media platforms, file-sharing services, and communication tools , and repurposing them for malicious operational use. Unlike traditional infrastructure acquisition (T1583.001 Domains, T1583.003 VPS), web service abuse leverages the reputation and trust of major platforms to evade detection. Adversaries use these services for command-and-control (C2), data exfiltration, payload hosting, credential harvesting, and malware distribution, all while their traffic blends seamlessly with millions of legitimate users accessing the same platforms.
Imagine using a public post office to send secret messages. The post office is trusted, it processes millions of letters every day, and your suspicious letter blends in perfectly with all the legitimate mail. No one inspects every envelope , that would stop the entire postal system. In the same way, adversaries use trusted web services like Dropbox, GitHub, and Telegram as their "post office", knowing that security tools won't block traffic to these platforms because doing so would shut down normal business operations. The malicious communications hide in plain sight, surrounded by billions of legitimate user interactions.
Ryan O'Connor is a mid-level threat actor affiliated with a financially motivated cybercrime group. His objective: infiltrate Meridian Financial Services, a mid-size accounting firm handling sensitive client financial records, and exfiltrate confidential documents for ransom and competitive intelligence purposes.
Rather than purchasing servers or registering custom domains , both of which leave financial and attribution trails , Ryan chooses a stealthier approach. He leverages the free tiers of widely trusted web services to build a completely free, anonymous attack infrastructure that produces traffic indistinguishable from normal employee activity.
The result is devastating. Over a six-week campaign, Ryan exfiltrates 4.7 GB of confidential client financial records, deploys ransomware to 23 workstations, and maintains persistent access through a multi-channel C2 chain that the security team never detects because all traffic flows through legitimate web service APIs.
Research and select web services that the target organization's employees are likely to use and that the network firewall permits. The goal is to choose platforms where your traffic will blend in with normal activity.
Register accounts on selected web services using anonymization techniques to prevent attribution. Each account should appear legitimate to both automated abuse detection systems and manual review.
Cross-reference: T1583 Acquire Infrastructure, T1583.003 Virtual Private Server
Set up the web service accounts to serve as C2 channels, payload hosting platforms, and data exfiltration destinations. This involves creating the appropriate file structures, API integrations, and communication protocols.
Cross-reference: T1583.007 Virtual Private Server for complementary VPS-based C2
Develop or configure malware implants and operational tooling that communicate exclusively through the selected web services. The integration must be seamless and produce traffic patterns consistent with normal user behavior.
Before launching operations against the actual target, validate that the web service infrastructure functions correctly and that traffic patterns appear normal to network monitoring tools.
Maintain operational resilience by regularly creating new accounts, migrating C2 channels, and rotating the web services used to prevent pattern-based detection and minimize the impact of account takedowns.
How adversaries maximize the effectiveness of web service abuse
How defenders detect and mitigate web service abuse
Monitor for users uploading large volumes of data to Dropbox, Google Drive, or OneDrive outside of normal business hours. Look for file uploads to newly created shared folders or accounts that were registered within the past 30 days. Pay special attention to files with double extensions (.pdf.exe, .docx.bat) or files that trigger malware scan warnings.
HIGHInvestigate GitHub accounts that are accessed from corporate networks but have no corresponding software development role. Look for accounts that primarily create private repositories, frequently delete and recreate repositories, or have API access patterns consistent with automated polling rather than human development workflows.
HIGHDetect unusual Telegram usage patterns from corporate endpoints, especially connections to the Telegram Bot API. Monitor for persistent long-lived WebSocket connections to Telegram servers, frequent API polling from non-developer workstations, and data transfers that are consistent with automated exfiltration rather than human chat activity.
MEDIUMMonitor for internal systems accessing public S3 buckets that are not owned by the organization. Track DNS queries for known S3 bucket naming patterns and investigate endpoints that make repeated requests to s3.amazonaws.com from unusual user agents or IP addresses. Alert on any internal connection to S3 buckets containing known-malicious file hashes.
HIGHDeploy RITA or similar beaconing analysis tools to detect periodic connections to web service APIs (api.github.com, api.dropbox.com, api.telegram.org) that occur at regular intervals. Look for connections from endpoints that do not normally interact with these services and flag any API polling that maintains consistent timing intervals without human variation.
MEDIUMMonitor SSO/identity provider logs for new OAuth token grants to web services that the user has not previously accessed. Flag accounts created on cloud storage or code repository platforms during off-hours, especially when the registration originates from VPN or proxy exit nodes that are not typical for the organization's geographic profile.
LOWWeb services abuse (T1583.006) is just one of eight distinct infrastructure acquisition sub-techniques in the MITRE ATT&CK framework. Understanding the full spectrum , from domain registration to VPS provisioning to botnet acquisition , is essential for building comprehensive defenses against modern adversary operations. Explore the related techniques below to complete your knowledge of the Resource Development tactic.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.