Trusted Design

TA0040 - Impact

戦術「Impact」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1485 Data Destruction Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to…
T1485.001 Lifecycle-Triggered Deletion Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within. Cloud s…
T1486 Data Encrypted for Impact Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to …
T1487 Disk Structure Wipe Adversaries may corrupt or wipe the disk data structures on hard drive necessary to boot systems; targeting specific cri…
T1488 Disk Content Wipe Adversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a netwo…
T1489 Service Stop Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping …
T1490 Inhibit System Recovery Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted syst…
T1491 Defacement Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the in…
T1491.001 Internal Defacement An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users, thus discredit…
T1491.002 External Defacement An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise…
T1492 Stored Data Manipulation Adversaries may insert, delete, or manipulate data at rest in order to manipulate external outcomes or hide activity.(Ci…
T1493 Transmitted Data Manipulation Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activit…
T1494 Runtime Data Manipulation Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user.(Citation:…
T1495 Firmware Corruption Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a…
T1496 Resource Hijacking Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system…
T1496.001 Compute Hijacking Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive tasks, which may impac…
T1496.002 Bandwidth Hijacking Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which…
T1496.003 SMS Pumping Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability.…
T1496.004 Cloud Service Hijacking Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-intensive tasks, whi…
T1498 Network Denial of Service Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resourc…
T1498.001 Direct Network Flood Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a tar…
T1498.002 Reflection Amplification Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. T…
T1499 Endpoint Denial of Service Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to use…
T1499.001 OS Exhaustion Flood Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS). A system's OS is …
T1499.002 Service Exhaustion Flood Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversar…
T1499.003 Application Exhaustion Flood Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availabil…
T1499.004 Application or System Exploitation Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability …
T1529 System Shutdown/Reboot Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating s…
T1531 Account Access Removal Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legi…
T1561 Disk Wipe Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availabi…
T1561.001 Disk Content Wipe Adversaries may erase the contents of storage devices on specific systems or in large numbers in a network to interrupt …
T1561.002 Disk Structure Wipe Adversaries may corrupt or wipe the disk data structures on a hard drive necessary to boot a system; targeting specific …
T1565 Data Manipulation Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threat…
T1565.001 Stored Data Manipulation Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thu…
T1565.002 Transmitted Data Manipulation Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activit…
T1565.003 Runtime Data Manipulation Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus thre…
T1657 Financial Theft Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other m…
T1667 Email Bombing Adversaries may flood targeted email addresses with an overwhelming volume of messages. This may bury legitimate emails …