attackercontrolled
Attackercontrolled, sometimes written attacker-controlled, is a security term used to describe assets that are under the control of an attacker, typically as a result of compromise or exploitation. In this state, the attacker can issue commands, access data, and influence the asset’s behavior, often without the legitimate owner’s knowledge. The concept can apply to various asset types, including endpoints, user accounts, network devices, cloud resources, and software services.
Causes of an attackercontrolled state include malware infections, phishing or credential theft, exploitation of software vulnerabilities,
Implications are significant and broad, covering data exfiltration, data integrity manipulation, credential theft, fraud, lateral movement
Indicators of attackercontrolled environments include unauthorized or newly created user accounts, changes to security configurations, unexpected
Response and remediation focus on containment, eradication of malicious software, remediation of vulnerabilities, credential resets, and