T1563 - Remote Service Session Hijacking

Tactics:
Lateral Movement
Platforms:
Linux macOS Windows
Detection:
Not specified
Description:
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service.

Adversaries may commandeer these sessions to carry out actions on remote systems. [Remote Service Session Hijacking](https://attack.mitre.org/techniques/T1563) differs from use of [Remote Services](https://attack.mitre.org/techniques/T1021) because it hijacks an existing session rather than creating a new session using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: RDP Hijacking Medium)(Citation: Breach Post-mortem SSH Hijack)
Sub-techniques (2)
ID ATT&CK Actions
T1563.001 SSH Hijacking
T1563.002 RDP Hijacking
Metadata
MITRE ID: T1563
STIX ID: attack-pattern--5b0ad6f8-6a16-...
Platforms: Linux, macOS, Windows
Created: 13/01/2026 17:48
Updated: 14/03/2026 16:00