Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
9 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Compromise Infrastructure | Resource Development | Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastruct… | Edit | |
| Compromise Infrastructure: Botnet | Resource Development | Adversaries may compromise numerous third-party systems to form a botnet that can be used during tar… | Edit | |
| Compromise Infrastructure: DNS Server | Resource Development | Adversaries may compromise third-party DNS servers that can be used during targeting. During post-co… | Edit | |
| Compromise Infrastructure: Domains | Resource Development | Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registrat… | Edit | |
| Compromise Infrastructure: Network Devices | Resource Development | Adversaries may compromise third-party network devices that can be used during targeting. Network de… | Edit | |
| Compromise Infrastructure: Server | Resource Development | Adversaries may compromise third-party servers that can be used during targeting. Use of servers all… | Edit | |
| Compromise Infrastructure: Serverless | Resource Development | Adversaries may compromise serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda f… | Edit | |
| Compromise Infrastructure: Virtual Private Server | Resource Development | Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during target… | Edit | |
| Compromise Infrastructure: Web Services | Resource Development | Adversaries may compromise access to third-party web services that can be used during targeting. A v… | Edit |