Esc
External Proxy - T1090.002
(ATT&CK® Technique)
Definition
Adversaries may use an external proxy to act as an intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. Many tools exist that enable traffic redirection through proxies or port redirection, including HTRAN, ZXProxy, and ZXPortMap. Adversaries use these types of proxies to manage command and control communications, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths to avoid suspicion.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.