← Back to Explore
T1584
Compromise Infrastructure
Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, network devices, and third-party web and DNS services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: ICANNDomainNameHijacking)(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye EPS Awakens Par...
PRE
6
Detections
2
Sources
0
Threat Actors
BY SOURCE
3elastic3sigma
PROCEDURES (5)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring
Network Connection Monitoring1 detections
Auto-extracted: 1 detections for network connection monitoring
Authentication Monitoring1 detections
Auto-extracted: 1 detections for authentication monitoring
Aws1 detections
Auto-extracted: 1 detections for aws
Aws1 detections
Auto-extracted: 1 detections for aws