T1204.001 - Malicious Link
Sub-technique
Tattiche:
Execution
Execution
Piattaforme:
Linux macOS Windows
Linux macOS Windows
Rilevamento:
Not specified
Not specified
Description:
An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002). Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203). Links may also lead users to download files that require execution via [Malicious File](https://attack.mitre.org/techniques/T1204/002).
Usato da Attori (20)
APT3
Nation-state
Nation-state
APT33
Nation-state
Nation-state
APT28
Nation-state
Nation-state
APT29
Nation-state
Nation-state
Turla
Nation-state
Nation-state
FIN7
Criminal
Criminal
OilRig
Nation-state
Nation-state
Molerats
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
APT32
Nation-state
Nation-state
FIN8
Unknown
Unknown
Mofang
Nation-state
Nation-state
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
TA505
Unknown
Unknown
WIZARD SPIDER
Nation-state
Nation-state
APT39
Unknown
Unknown
BlackTech
Unknown
Unknown
WindShift
Unknown
Unknown
Malware (20)
Bumblebee other
Pony other
NETWIRE other
Emotet other
Gootloader other
Squirrelwaffle other
Snip3 other
GuLoader other
ObliqueRAT other
SocGholish other
SpicyOmelette other
Javali other
TSCookie other
Latrodectus other
Saint Bot other
SMOKEDHAM other
Kerrdown other
Grandoreiro other
Bazar other
PLEAD other
Metadata
| MITRE ID: | T1204.001 |
| STIX ID: | attack-pattern--ef67e13e-5598-... |
| Piattaforme: | Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |