Impact
Type: tactic
Description: The adversary is trying to communicate with compromised systems to control them.
Version: 0.1.0
Created At: 2024-10-11 16:54:32 +0300
Last Modified At: 2024-10-11 16:54:32 +0300
Tactic Order: 14
External References
Related Objects
- <-- Citation Manipulation (technique): An adversary can social engineer by providing trustworthy sources to maliciously-crafted messages or data.
- <-- AI Social Engineering (technique): An adversary can social engineer their victim through interactions with their trusted AI systems.
- <-- Mutative Tool Invocation (technique): An adversary can achieve their goals by invoking tools on behalf of a compromised user.