Critical Infrastructure Cybersecurity Framework

Acquire Access

Adversaries may purchase or otherwise acquire an existing access to a target system or network.

Description

Adversaries may purchase or otherwise acquire an existing access to a target system or network.

Quick Info

Technique ID
T1650
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.