戦術「Impact」に関連する攻撃手法(Technique)の一覧です。
| Technique ID | Name | Description |
|---|---|---|
| T1485 | Data Destruction | Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to… |
| T1485.001 | Lifecycle-Triggered Deletion | Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within. Cloud s… |
| T1486 | Data Encrypted for Impact | Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to … |
| T1487 | Disk Structure Wipe | Adversaries may corrupt or wipe the disk data structures on hard drive necessary to boot systems; targeting specific cri… |
| T1488 | Disk Content Wipe | Adversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a netwo… |
| T1489 | Service Stop | Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping … |
| T1490 | Inhibit System Recovery | Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted syst… |
| T1491 | Defacement | Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the in… |
| T1491.001 | Internal Defacement | An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users, thus discredit… |
| T1491.002 | External Defacement | An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise… |
| T1492 | Stored Data Manipulation | Adversaries may insert, delete, or manipulate data at rest in order to manipulate external outcomes or hide activity.(Ci… |
| T1493 | Transmitted Data Manipulation | Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activit… |
| T1494 | Runtime Data Manipulation | Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user.(Citation:… |
| T1495 | Firmware Corruption | Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a… |
| T1496 | Resource Hijacking | Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system… |
| T1496.001 | Compute Hijacking | Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive tasks, which may impac… |
| T1496.002 | Bandwidth Hijacking | Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which… |
| T1496.003 | SMS Pumping | Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability.… |
| T1496.004 | Cloud Service Hijacking | Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, whi… |
| T1498 | Network Denial of Service | Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resourc… |
| T1498.001 | Direct Network Flood | Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a tar… |
| T1498.002 | Reflection Amplification | Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. T… |
| T1499 | Endpoint Denial of Service | Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to use… |
| T1499.001 | OS Exhaustion Flood | Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS). A system's OS is … |
| T1499.002 | Service Exhaustion Flood | Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversar… |
| T1499.003 | Application Exhaustion Flood | Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availabil… |
| T1499.004 | Application or System Exploitation | Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability … |
| T1529 | System Shutdown/Reboot | Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating s… |
| T1531 | Account Access Removal | Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legi… |
| T1561 | Disk Wipe | Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availabi… |
| T1561.001 | Disk Content Wipe | Adversaries may erase the contents of storage devices on specific systems or in large numbers in a network to interrupt … |
| T1561.002 | Disk Structure Wipe | Adversaries may corrupt or wipe the disk data structures on a hard drive necessary to boot a system; targeting specific … |
| T1565 | Data Manipulation | Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threat… |
| T1565.001 | Stored Data Manipulation | Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thu… |
| T1565.002 | Transmitted Data Manipulation | Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activit… |
| T1565.003 | Runtime Data Manipulation | Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus thre… |
| T1657 | Financial Theft | Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other m… |
| T1667 | Email Bombing | Adversaries may flood targeted email addresses with an overwhelming volume of messages. This may bury legitimate emails … |