EXPLORE
← Back to Explore
T1665

Hide Infrastructure

Adversaries may manipulate network traffic in order to hide and evade detection of their C2 infrastructure. This can be accomplished by identifying and filtering traffic from defensive tools,(Citation: TA571) masking malicious domains to obfuscate the true destination from both automated scanning tools and security researchers,(Citation: Schema-abuse)(Citation: Facad1ng)(Citation: Browser-updates) and otherwise hiding malicious artifacts to delay discovery and prolong the effectiveness of advers...

ESXiLinuxNetwork DevicesWindowsmacOS
0
Detections
0
Sources
2
Threat Actors

THREAT ACTORS (2)

DETECTIONS (0)