MITRE ATT&CK / T1584.005
T1584.005
Botnet
Description
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).
Platforms
Mitigations
- M1056 — Pre-compromise
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- Stack String Obfuscation in C: The Technique That Blinds AV, YARA, and Static Scanners
- MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware
- xlabs_v1 Mirai Botnet Exploits ADB to Build IoT DDoS-for-Hire Network
- TrustFall: AI Coding Agents Exploitable with One Enter Keypress
- PCPJack Cloud Worm Evicts TeamPCP and Steals 40+ Credential Types at Scale
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →