DET0854 Detection of Virtual Private Server
| Item | Value |
|---|---|
| ID | DET0854 |
| Version | 1.0 |
| Created | 21 October 2025 |
| Last Modified | 21 October 2025 |
Technique Detected: T1584.003 (Virtual Private Server)
Analytics
PRE
AN1986
Once adversaries have provisioned software on a compromised VPS (ex: for use as a command and control server), internet scans may reveal VPSs that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021)
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
Log Sources
| Data Component | Name | Channel |
|---|---|---|
| Response Content (DC0104) | Internet Scan | None |
| Response Metadata (DC0106) | Internet Scan | None |
Mutable Elements
| Field | Description |
|---|---|