Compromise 3rd party infrastructure to support delivery - T1334 (e51398e6-53dc-4e9f-a323-e54683d8672b)
This object is deprecated as its content has been merged into the enterprise domain. Please see the PRE matrix for its replacement. The prior content of this page has been preserved here.
Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it for some or all of the attack cycle. (Citation: WateringHole2014) (Citation: FireEye Operation SnowMan)