T1583.006

Web Services

Adversaries may register for web services that can be used during targeting. A variety of popular websites exist for adversaries to register for a web-based service that can be abused during later stages of the adversary lifecycle, such as during Command and Control (Web Service), Exfiltration Over Web Service, or Phishing. Using common services such as those offered by Google, GitHub, Discord, Telegram, or Dropbox makes it easier for adversaries to hide in expected noise. Real-world threat actors including APT29, Turla, Earth Lusca, Mustang Panda, Lazarus Group, HAFNIUM, MuddyWater, and Contagious Interview have all leveraged legitimate web platforms to host malware, stage C2 infrastructure, or receive exfiltrated data. Because the adversary's actual registration of these accounts occurs entirely outside the victim environment, detection pivots to identifying the operational use of these platforms by suspicious processes within monitored endpoints.

Microsoft Sentinel / Defender
kusto
let WebServiceDomains = dynamic([
    "api.github.com", "raw.githubusercontent.com", "gist.githubusercontent.com", "gist.github.com",
    "api.dropboxapi.com", "content.dropboxapi.com", "www.dropbox.com",
    "www.googleapis.com", "drive.google.com", "storage.googleapis.com", "firebaseio.com", "firebase.google.com",
    "api.telegram.org",
    "discord.com", "discordapp.com", "cdn.discordapp.com", "hooks.discord.com",
    "pastebin.com", "rentry.co", "paste.ee", "hastebin.com",
    "trycloudflare.com", "workers.dev",
    "notion.so", "api.notion.com",
    "graph.microsoft.com", "onedrive.live.com",
    "terabox.com", "sync.com", "onehub.com",
    "filemail.com", "file.io"
]);
let SuspiciousInitiators = dynamic([
    "powershell.exe", "pwsh.exe", "cmd.exe", "mshta.exe",
    "wscript.exe", "cscript.exe", "rundll32.exe", "regsvr32.exe",
    "certutil.exe", "bitsadmin.exe", "curl.exe",
    "python.exe", "pythonw.exe", "python3.exe",
    "java.exe", "javaw.exe",
    "msbuild.exe", "installutil.exe", "csc.exe"
]);
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName in~ (SuspiciousInitiators)
| where RemoteUrl has_any (WebServiceDomains)
| extend IsPayloadRetrieve = RemoteUrl has_any ("raw.githubusercontent.com", "gist.githubusercontent.com", "pastebin.com", "rentry.co", "paste.ee", "hastebin.com")
| extend IsC2Channel = RemoteUrl has_any ("api.telegram.org", "discord.com", "discordapp.com", "hooks.discord.com", "firebaseio.com", "trycloudflare.com")
| extend IsDataExfil = RemoteUrl has_any ("api.dropboxapi.com", "content.dropboxapi.com", "drive.google.com", "storage.googleapis.com", "terabox.com", "filemail.com", "onedrive.live.com")
| extend SuspicionScore = toint(IsPayloadRetrieve) + toint(IsC2Channel) + toint(IsDataExfil)
| project Timestamp, DeviceName, AccountName,
          InitiatingProcessFileName, InitiatingProcessCommandLine,
          InitiatingProcessParentFileName, InitiatingProcessParentCommandLine,
          RemoteUrl, RemoteIP, RemotePort,
          IsPayloadRetrieve, IsC2Channel, IsDataExfil, SuspicionScore
| sort by Timestamp desc
high severity medium confidence

Data Sources

Network Traffic: Network Connection Creation Microsoft Defender for Endpoint DeviceNetworkEvents

Required Tables

DeviceNetworkEvents

False Positives

  • Developer workstations running build pipelines, CI runners, or git clients that call api.github.com from powershell.exe or python.exe as part of automated workflows
  • Security tooling and vulnerability scanners that use Python or Java to pull threat intelligence feeds from GitHub or Pastebin
  • Legitimate Python or Java applications using the Dropbox, Google Drive, or OneDrive SDK for authorized file sync and backup
  • IT automation scripts using curl.exe or PowerShell to post notifications to Teams/Discord/Slack webhooks as part of sanctioned alerting pipelines
  • Software installers or package managers (pip, npm, maven) fetching packages from Google Storage or Firebase CDN during first-run or updates

Unlock Pro Content

Get the full detection package for T1583.006 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections