T1619 - Cloud Storage Object Discovery
Tattiche:
Discovery
Discovery
Piattaforme:
IaaS
IaaS
Rilevamento:
Not specified
Not specified
Description:
Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) on a local host, after identifying available storage services (i.e. [Cloud Infrastructure Discovery](https://attack.mitre.org/techniques/T1580)) adversaries may access the contents/objects stored in cloud infrastructure.
Cloud service providers offer APIs allowing users to enumerate objects stored within cloud storage. Examples include ListObjectsV2 in AWS (Citation: ListObjectsV2) and List Blobs in Azure(Citation: List Blobs) .
Cloud service providers offer APIs allowing users to enumerate objects stored within cloud storage. Examples include ListObjectsV2 in AWS (Citation: ListObjectsV2) and List Blobs in Azure(Citation: List Blobs) .
Malware (2)
Metadata
| MITRE ID: | T1619 |
| STIX ID: | attack-pattern--8565825b-21c8-... |
| Piattaforme: | IaaS |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |