Server - T1584.004 (e196b5c5-8118-4a1c-ab8a-936586ce3db5)
Adversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control.(Citation: TrendMicro EarthLusca 2022) Instead of purchasing a Server or Virtual Private Server, adversaries may compromise third-party servers in support of operations.
Adversaries may also compromise web servers to support watering hole operations, as in Drive-by Compromise, or email servers to support Phishing operations.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Compromise Infrastructure - T1584 (7e3beebd-8bfe-4e7b-a892-e44ab06a75f9) | Attack Pattern | Server - T1584.004 (e196b5c5-8118-4a1c-ab8a-936586ce3db5) | Attack Pattern | 1 |