Server - T1583.004 (60c4b628-4807-4b0b-bbf5-fdac8643c337)
Adversaries may buy, lease, rent, or obtain physical servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, such as watering hole operations in Drive-by Compromise, enabling Phishing operations, or facilitating Command and Control. Instead of compromising a third-party Server or renting a Virtual Private Server, adversaries may opt to configure and run their own servers in support of operations. Free trial periods of cloud servers may also be abused.(Citation: Free Trial PurpleUrchin)(Citation: Freejacked)
Adversaries may only need a lightweight setup if most of their activities will take place using online infrastructure. Or, they may need to build extensive infrastructure if they want to test, communicate, and control other aspects of their activities on their own systems.(Citation: NYTStuxnet)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) | Attack Pattern | Server - T1583.004 (60c4b628-4807-4b0b-bbf5-fdac8643c337) | Attack Pattern | 1 |