(Created page with "The adversary is trying to establish resources they can use to support operations. Resource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Cont...") |
No edit summary |
||
Line 1: | Line 1: | ||
=Description= | |||
Resource Development is a technique used by adversaries to establish resources that support their operations. This involves the creation, purchase, or compromise/theft of resources that can be leveraged in various phases of the adversary lifecycle. Examples of these resources include infrastructure, accounts, and capabilities. Resource Development plays a critical role in supporting other phases of the adversary's operations, such as the use of purchased domains for Command and Control, email accounts for phishing as part of Initial Access, or stolen code signing certificates for Defense Evasion. In summary, Resource Development is a crucial aspect of the adversary's operations, as it provides the necessary resources to support and facilitate their activities. | |||
Revision as of 14:41, 29 January 2023
Description
Resource Development is a technique used by adversaries to establish resources that support their operations. This involves the creation, purchase, or compromise/theft of resources that can be leveraged in various phases of the adversary lifecycle. Examples of these resources include infrastructure, accounts, and capabilities. Resource Development plays a critical role in supporting other phases of the adversary's operations, such as the use of purchased domains for Command and Control, email accounts for phishing as part of Initial Access, or stolen code signing certificates for Defense Evasion. In summary, Resource Development is a crucial aspect of the adversary's operations, as it provides the necessary resources to support and facilitate their activities.