ID: TEQ-010
Phase(s): Resource Development
Tactic(s): Infrastructure Acquisition

In preparing for an attack and adversary may seek to acquire proxy servers through which to route traffic. This will allow them to disguise the true source of the traffic, enabling one source to appear as many and/or permitting the bypassing of IP-based blocking of traffic.