Attackerhosted
Attacker-hosted refers to digital infrastructure that is controlled by an attacker and used to support malicious operations. In cyber security, it describes hosting services, domains, servers, or cloud resources that the attacker uses to deliver payloads, host phishing pages, operate command-and-control (C2) servers, or exfiltrate data. This contrasts with infrastructure that is compromised or operated by victims or third parties on behalf of defenders.
In practice, attacker-hosted infrastructure is common in phishing campaigns, malware campaigns, and exploit kits. Phishing kits
Advantages for attackers include control and persistence, ability to customize payloads, and easier operational security. Disadvantages
Defenders monitor for attacker-hosted activity by tracking known malicious domains and IPs, unusual DNS patterns, and
Ethical and legal considerations: using or operating attacker-hosted infrastructure for unauthorized access is illegal in most