Skip to content

DET0838 Detection of Virtual Private Server

Item Value
ID DET0838
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1583.003 (Virtual Private Server)

Analytics

PRE

AN1970

Once adversaries have provisioned a VPS (ex: for use as a command and control server), internet scans may reveal servers that adversaries have acquired. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.

Log Sources
Data Component Name Channel
Response Content (DC0104) Internet Scan None
Response Metadata (DC0106) Internet Scan None
Mutable Elements
Field Description