T1584.004 - Server

Sub-technique
Tactics:
Resource Development
Platforms:
PRE
Detection:
Not specified
Description:
Adversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control.(Citation: TrendMicro EarthLusca 2022) Instead of purchasing a [Server](https://attack.mitre.org/techniques/T1583/004) or [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may compromise third-party servers in support of operations.

Adversaries may also compromise web servers to support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations.
Metadata
MITRE ID: T1584.004
STIX ID: attack-pattern--e196b5c5-8118-...
Platforms: PRE
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00