**Summary**: A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.
**Tactic**: TA18 Drive Online Harms **Parent Technique:** T0123 Control Information Environment through Offensive Cyberspace Operations
| Associated Technique | Description |
| --------- | ------------------------- |
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
# Technique T0123.004: Conduct Server Redirect
**Summary**: A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.
**Tactic**: TA18 Drive Online Harms **Parent Technique:** T0123 Control Information Environment through Offensive Cyberspace Operations
| Associated Technique | Description |
| --------- | ------------------------- |
| Incident | Descriptions given for this incident |
| -------- | -------------------- |
| Counters | Response types |
| -------- | -------------- |
# Technique T0123.004: Conduct Server Redirect
**Summary**: A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.