Skip to content

New attack technique: Read GCE Instance Metadata via the Compute API (gcp.discovery.download-instance-metadata)#795

Draft
Minosity-VR wants to merge 1 commit intosimon.marechal/gcp-defense-evasion-remove-vpc-flow-logsfrom
simon.marechal/gcp-discovery-download-instance-metadata
Draft

New attack technique: Read GCE Instance Metadata via the Compute API (gcp.discovery.download-instance-metadata)#795
Minosity-VR wants to merge 1 commit intosimon.marechal/gcp-defense-evasion-remove-vpc-flow-logsfrom
simon.marechal/gcp-discovery-download-instance-metadata

Conversation

@Minosity-VR
Copy link
Collaborator

@Minosity-VR Minosity-VR commented Mar 26, 2026

What does this PR do?

New attack technique: gcp.discovery.download-instance-metadata

Motivation

GCP parity with existing AWS attack techniques.

Test results

  • stratus detonate gcp.discovery.download-instance-metadata
  • compute.instances.get appears in GCP Data Access audit logs (note: this log is very generic and likely not actionable on its own)

Checklist

  • The attack technique emulates a single attack step, not a full attack chain
  • We have factual evidence & references that the attack technique was used by real malware, pentesters, or attackers
  • The attack technique makes no assumption about the state of the environment prior to warming it up

closes #534

…(gcp.discovery.download-instance-metadata) Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

1 participant