MITRE ATT&CK / T1204.001
T1204.001
Malicious Link
Description
An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002). Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203). Links may also lead users to download files that require execution via [Malicious File](https://attack.mitre.org/techniques/T1204/002).
Platforms
Mitigations
- M1031 — Network Intrusion Prevention
- M1017 — User Training
- M1021 — Restrict Web-Based Content
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- Vimeo Data Breach: ShinyHunters Steals 119,000 Users via Anodot Supply Chain
- FEMITBOT: Telegram Mini Apps Used for Crypto Scams and Android Malware Delivery
- Cyber Kill Chain Methodology
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →