Abuse Trusted Sites

Type: technique

Description: The adversary exfiltrates sensitive data by embedding it in resources loaded from attacker-controlled endpoints hosted on trusted domains. This bypasses security controls like Content Security Policies and evades detection by leveraging implicit trust in known sites.

Version: 0.1.0

Created At: 2025-10-01 13:13:22 -0400

Last Modified At: 2025-10-01 13:13:22 -0400


External References