T1584.004 - Server
Sub-technique
Tactics:
Resource Development
Resource Development
Platforms:
PRE
PRE
Detection:
Not specified
Not specified
Description:
Adversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control.(Citation: TrendMicro EarthLusca 2022) Instead of purchasing a [Server](https://attack.mitre.org/techniques/T1583/004) or [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may compromise third-party servers in support of operations.
Adversaries may also compromise web servers to support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations.
Adversaries may also compromise web servers to support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations.
Used by Actors (10)
Metadata
| MITRE ID: | T1584.004 |
| STIX ID: | attack-pattern--e196b5c5-8118-... |
| Platforms: | PRE |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |