Critical Infrastructure Cybersecurity Framework
T1219C2

Remote Access Software

An adversary may use legitimate desktop support and remote access software to establish an interactive command and control channel.

Description

An adversary may use legitimate desktop support and remote access software to establish an interactive command and control channel.

Quick Info

Technique ID
T1219
Tactic
C2
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.