Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Proxy Command And Control Adversaries may use a connection proxy to direct network traffic between systems or act as an interm… Edit
Proxy: Domain Fronting Command And Control Adversaries may take advantage of routing schemes in Content Delivery Networks (CDNs) and other serv… Edit
Proxy: External Proxy Command And Control Adversaries may use an external proxy to act as an intermediary for network communications to a comm… Edit
Proxy: Internal Proxy Command And Control Adversaries may use an internal proxy to direct command and control traffic between two or more syst… Edit
Proxy: Multi-hop Proxy Command And Control Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typical… Edit