Drive-by Compromise
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple ways of delivering exploit code to a browser exist (i.e., [Drive-by Target](https://attack.mitre.org/techniques/T1608/004)), including: * A legitimate website is compromised, allowing adversaries to inject malicious code * Script files served to a legitimate website from a publicly writeable cloud storage bucket are modified by an adversary * Malicious ads are paid for and serv...
BY SOURCE
PROCEDURES (10)
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for email
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for remote