Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Anonymity services

Anonymity services reduce the amount of information available that can be used to track an adversary's activities. Multiple options are available to hide activity, limit tracking, and increase anonymity. [1] [2]

ID: T1306
Sub-techniques:  No sub-techniques
Tactic: Adversary Opsec
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Depends on service. Some are easy to detect, but are hard to trace (e.g., [https://torproject.org TOR]).

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Easy access to anonymizers, quasi-anonymous services like remailers, [https://torproject.org TOR], relays, burner phones, etc.

References

  1. Roger Dingledine, Nick Mathewson, Paul Syverson. (2004, August). Tor: The Second-Generation Onion Router. Retrieved March 28, 2017.
  1. Sean Gallagher. (2012, March 6). Inside the hacking of Stratfor: the FBI’s case against Antisec member Anarchaos. Retrieved March 1, 2017.