MITRE ATT&CK T1090.003
Source: attack.mitre.org
Published:
<p>Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typically, a defender will be able to identify the last proxy traffic traversed before it enters their network; the defender may or may not be able to identify any proxies before the last-hop proxy. This