Adversary creates duplicates of legitimate websites. When users visit a counterfeit site, the site can gather information or upload malware.
Description
Consequences
Relationships
Related ATT&CK Techniques
1
Adversary creates duplicates of legitimate websites. When users visit a counterfeit site, the site can gather information or upload malware.