Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
文章介绍了“Living Off The Cloud”(LOTC)技术,现代网络攻击者利用可信云服务如Google Drive、Slack和GitHub进行隐蔽操作。攻击手法包括通过云存储进行C2通信和持久化,防御需监控异常云服务使用和日志分析。未来可能结合AI技术提升攻击能力。
2025-10-10 11:30:22
Author: infosecwriteups.com(查看原文)
阅读量:73
收藏
Introduction: Blending into the Digital Skyline
Cyber threats today no longer rely on flashy malware or sketchy infrastructure. Modern adversaries especially Advanced Persistent Threats (APTs) are turning to trusted cloud services to operate invisibly. This technique is called Living Off The Cloud (LOTC). and it’s rapidly becoming a staple of Red Team and nation-state toolkits.
Just like Living Off the Land (LOTL) involves using native OS tools, LOTC uses cloud-based infrastructure you probably already trust.
Why it Works
Cloud services are:
Widely used and trusted: Firewalls and proxies often allow their traffic.
Encrypted by default: Most use HTTPs, making inspection harder.
Hard to blacklist: You can’t just block Google or Microsoft in most organizations.
Globally available: Attackers don’t need infrastructure, just an account.
Red Teaming Use Cases
Command and Control via Google Drive or Dropbox
TTP Flow:
Attacker drops payloads into shared cloud folder.
Infected host polls folder every 30s via scheduled task or beacon.
Exfiltrated data (e.g., screenshots, keystrokes) uploaded as new files.