Internal Proxy
Adversaries may use an internal proxy to direct command and control traffic between two or more systems in a compromised environment. Many tools exist that enable traffic redirection through proxies or port redirection, including [HTRAN](https://attack.mitre.org/software/S0040), ZXProxy, and ZXPortMap. (Citation: Trend Micro APT Attack Tools) Adversaries use internal proxies to manage command and control communications inside a compromised environment, to reduce the number of simultaneous outbou...
BY SOURCE
PROCEDURES (9)
Auto-extracted: 2 detections for cloud
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for tunnel
Auto-extracted: 1 detections for registry monitoring
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for service