Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
9 threats — page 1 of 1
Name Category Tags Description
Compromise Infrastructure Resource Development Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastruct… Edit
Compromise Infrastructure: Botnet Resource Development Adversaries may compromise numerous third-party systems to form a botnet that can be used during tar… Edit
Compromise Infrastructure: DNS Server Resource Development Adversaries may compromise third-party DNS servers that can be used during targeting. During post-co… Edit
Compromise Infrastructure: Domains Resource Development Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registrat… Edit
Compromise Infrastructure: Network Devices Resource Development Adversaries may compromise third-party network devices that can be used during targeting. Network de… Edit
Compromise Infrastructure: Server Resource Development Adversaries may compromise third-party servers that can be used during targeting. Use of servers all… Edit
Compromise Infrastructure: Serverless Resource Development Adversaries may compromise serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda f… Edit
Compromise Infrastructure: Virtual Private Server Resource Development Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during target… Edit
Compromise Infrastructure: Web Services Resource Development Adversaries may compromise access to third-party web services that can be used during targeting. A v… Edit