Impact

Type: tactic

Description: The adversary is trying to communicate with compromised systems to control them.

Version: 0.1.0

Created At: 2024-10-11 16:54:32 +0300

Last Modified At: 2024-10-11 16:54:32 +0300

Tactic Order: 14


External References

  • <-- Citation Manipulation (technique): An adversary can social engineer by providing trustworthy sources to maliciously-crafted messages or data.
  • <-- AI Social Engineering (technique): An adversary can social engineer their victim through interactions with their trusted AI systems.
  • <-- Mutative Tool Invocation (technique): An adversary can achieve their goals by invoking tools on behalf of a compromised user.