Skip to content

Info

ID: AT-GA006.001
Tactic: Gain Access
Technique: Valid Accounts
Platforms: IaaS

Cloud Accounts

Cloud accounts represent a significant attack vector within the "Gain Access" phase where adversaries leverage compromised or created credentials to access cloud environments and their resources. This sub-technique of "Valid Accounts" involves either compromising existing credentials through methods like phishing, credential stuffing, or password spraying; creating accounts through social engineering or exploitation of misconfigured cloud services; or maintaining persistence through service accounts with elevated privileges. Once obtained, these legitimate credentials allow adversaries to bypass traditional security controls, operate under the guise of authorized users, access sensitive data across multiple cloud services (IaaS, PaaS, SaaS), and potentially move laterally within the cloud infrastructure. The impact is particularly severe due to the extensive permissions and cross-service access that cloud accounts often possess, especially in environments with inadequate permission boundaries or monitoring capabilities.

Procedure Examples

ID Name Description
AC-0001 ByBit $1.5B Crypto Heist Harvesting of Developer1's AWS credentials from the compromised macOS workstation, providing legitimate access to Safe{Wallet}'s AWS infrastructure.

Mitigations

ID Mitigation Description
M1032 Multi-Factor Authentication Require MFA for every interactive, API, and console login; bind service-account tokens to workload identity or hardware keys so stolen credentials cannot be reused.
M1026 Privileged Account Management Implement least-privilege roles, just-in-time elevation, and continuous access reviews so that any compromised account offers minimal blast radius within the IaaS estate.
M1036 Account Use Policies Enforce session-lifetime limits, geo/IP allow-lists, and automated key rotation to restrict when and where credentials may be used, frustrating long-lived adversary sessions.

Detection

ID Data Source Detection
DS0028 Logon Session – Creation / Metadata Correlate active sessions across cloud IdPs with physical-access or VPN telemetry; flag logons whose source IP, device fingerprint, or geolocation is inconsistent with the user’s presence (e.g., session token issued while the badge system shows the user off-site).
DS0002 User Account – Authentication Detect anomalous sign-ins: impossible-travel, first-seen device, unmanaged OS, or automation-tool user agents (python-requests, curl, aws-cli). Elevate severity if the session is immediately followed by privileged API calls.
DS0025 Cloud Service – Modification Alert when IAM roles, policies, or access keys are created/updated in a way that broadens privileges and lacks a corresponding change-ticket in CMDB or approval workflow.
DS0132 Network Traffic – Flow Baseline source ASN / region for each service or access key; trigger when API traffic originates from residential, VPS, or never-seen regions — especially within minutes of a password reset or MFA bypass.
DS0059 Cloud Storage – Access Raise an alert when a principal downloads data volumes or object counts that exceed historical norms or performs fetching loops across many buckets immediately after key creation.