Hop point
A compromised or commercially purchased intermediary system that is used as a proxy to disguise the attacker’s true point of origin.
Source: Cyber Threats to Elections – A Lexicon, Office of the Director of National Intelligence, https://www.dni.gov/files/CTIIC/documents/CTIIC_2018_Lexicon_without_banner_small_file_for_Post.pdf