MITRE ATT&CK Technique
Persistence T1505
Description

Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.(Citation: volexity_0day_sophos_FW)

Supported Platforms
Windows Linux macOS Network Devices ESXi
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2019-06-28T17:52:07.296Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may abuse legitimate extensible development '
                'features of servers to establish persistent access to '
                'systems. Enterprise server applications may include features '
                'that allow developers to write and install software or '
                'scripts to extend the functionality of the main application. '
                'Adversaries may install malicious components to extend and '
                'abuse server applications.(Citation: volexity_0day_sophos_FW)',
 'external_references': [{'external_id': 'T1505',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1505'},
                         {'description': 'Adair, S., Lancaster, T., Volexity '
                                         'Threat Research. (2022, June 15). '
                                         'DriftingCloud: Zero-Day Sophos '
                                         'Firewall Exploitation and an '
                                         'Insidious Breach. Retrieved July 1, '
                                         '2022.',
                          'source_name': 'volexity_0day_sophos_FW',
                          'url': 'https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/'},
                         {'description': 'US-CERT. (2015, November 13). '
                                         'Compromised Web Servers and Web '
                                         'Shells - Threat Awareness and '
                                         'Guidance. Retrieved June 8, 2016.',
                          'source_name': 'US-CERT Alert TA15-314A Web Shells',
                          'url': 'https://www.us-cert.gov/ncas/alerts/TA15-314A'}],
 'id': 'attack-pattern--d456de47-a16f-4e46-8980-e67478a12dcb',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'persistence'}],
 'modified': '2025-10-24T17:49:27.065Z',
 'name': 'Server Software Component',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows', 'Linux', 'macOS', 'Network Devices', 'ESXi'],
 'x_mitre_version': '1.5'}
Quick Actions
Related Threat Actors (4)
Agrius
High

APT28
High

APT32
High

APT29
High