T1584.005 - Botnet
Sub-technique
Tattiche:
Resource Development
Resource Development
Piattaforme:
PRE
PRE
Rilevamento:
Not specified
Not specified
Description:
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).
Usato da Attori (4)
Metadata
| MITRE ID: | T1584.005 |
| STIX ID: | attack-pattern--810d8072-afb6-... |
| Piattaforme: | PRE |
| Created: | 13/01/2026 17:48 |
| Updated: | 14/03/2026 16:00 |