Content Injection (T1659)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Content Injection

Associated Tactics

  • Initial Access
  • Command And Control

Initial Access (TA0001)

The adversary is trying to get into your network. Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited-use due to changing passwords.

View on ATT&CK

Procedure Examples

Description Source(s)
Budington, B. (2015, April 2). China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack. Retrieved September 1, 2023. EFF China GitHub Attack
Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 1, 2023. ESET MoustachedBouncer
Kaspersky IT Encyclopedia. (n.d.). Man-in-the-middle attack. Retrieved September 1, 2023. Kaspersky Encyclopedia MiTM
Starikova, A. (2023, February 14). Man-on-the-side – peculiar attack. Retrieved September 1, 2023. Kaspersky ManOnTheSide