Backdoor (Action > Hacking > Vector) (6bccd4b5-1911-532e-9a53-1d22bb2b043f)
Hacking actions taken through a backdoor. C2 is only used by malware.
| Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
|---|---|---|---|---|
| Backdoor (daa422c4-1a20-435f-bf90-496ea1dd453b) | SPARTA Techniques | Backdoor (Action > Hacking > Vector) (6bccd4b5-1911-532e-9a53-1d22bb2b043f) | VERIS Framework | 1 |