Counterattacks from Compromised Positions