Detection of Server

Technique Detected:  Server | T1584.004

ID: DET0874
Domains: Enterprise
Analytics: AN2006
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN2006

Once adversaries have provisioned software on a compromised server (ex: for use as a command and control server), internet scans may reveal servers that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.[1][2][3]
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.

Log Sources
Data Component Name Channel
Response Content (DC0104) Internet Scan None
Response Metadata (DC0106) Internet Scan None

References