Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
9 threats — page 1 of 1
Name Category Tags Description
Acquire Infrastructure Resource Development Adversaries may buy, lease, rent, or obtain infrastructure that can be used during targeting. A wide… Edit
Acquire Infrastructure: Botnet Resource Development Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeti… Edit
Acquire Infrastructure: DNS Server Resource Development Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting.… Edit
Acquire Infrastructure: Domains Resource Development Adversaries may acquire domains that can be used during targeting. Domain names are the human readab… Edit
Acquire Infrastructure: Malvertising Resource Development Adversaries may purchase online advertisements that can be abused to distribute malware to victims. … Edit
Acquire Infrastructure: Server Resource Development Adversaries may buy, lease, rent, or obtain physical servers that can be used during targeting. Use … Edit
Acquire Infrastructure: Serverless Resource Development Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers, … Edit
Acquire Infrastructure: Virtual Private Server Resource Development Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a… Edit
Acquire Infrastructure: Web Services Resource Development Adversaries may register for web services that can be used during targeting. A variety of popular we… Edit