Resource Development
The adversary is trying to establish resources they can use to support operations. Resource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Control, email accounts for phishing as a part of Initial Access, or stealing code signing certificates to help with Defense Evasion.
Techniques
Techniques: 2
ID | Name | Description | |
---|---|---|---|
T1583 | Acquire Infrastructure |
Adversaries may buy, lease, rent, or obtain infrastructure that can be used during targeting. A wide variety of infrastructure exists for hosting and orchestrating adversary operations. Infrastructure solutions include physical or cloud servers, domains, and third-party web services. Some infrastructure providers offer free trial periods, enabling infrastructure acquisition at limited to no cost. Additionally, botnets are available for rent or purchase. |
|
↳ | T1583.001 | Domains |
Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. They can be purchased or, in some cases, acquired for free. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. A threat actor using credentials with appropriate permissions is able to register an Amazon Route 53 domain and create hosted zones pointing to resources of the threat actor's choosing. These resources can be used to host malicious content and files, and the victim will be billed for the domain and hosted zone. Additionally, hosted zones can be created under previously existing legitimate domains to mislead unsuspecting visitors to the threat actor created domain or hosted zone. |