EXPLORE
← Back to Explore
T1659

Content Injection

Adversaries may gain access and continuously communicate with victims by injecting malicious content into systems through online network traffic. Rather than luring victims to malicious payloads hosted on a compromised website (i.e., [Drive-by Target](https://attack.mitre.org/techniques/T1608/004) followed by [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)), adversaries may initially access victims through compromised data-transfer channels where they can manipulate traffic and/...

LinuxmacOSWindows
0
Detections
0
Sources
1
Threat Actors

THREAT ACTORS (1)

DETECTIONS (0)