Botnet - T1584.005 (810d8072-afb6-4a56-9ee7-86379ac4a6f3)
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale Phishing or Distributed Denial of Service (DDoS).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Botnet - T1584.005 (810d8072-afb6-4a56-9ee7-86379ac4a6f3) | Attack Pattern | Compromise Infrastructure - T1584 (7e3beebd-8bfe-4e7b-a892-e44ab06a75f9) | Attack Pattern | 1 |