CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1102C2

Web Service

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system.

Description

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system.

Quick Info

Technique ID
T1102
Tactic
C2
Sub-Techniques
3
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.