TA0040 Impact Mappings

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1485 Data Destruction 10 0
T1486 Data Encrypted for Impact 11 0
T1565 Data Manipulation 26 3
T1491 Defacement 10 2
T1561 Disk Wipe 10 2
T1499 Endpoint Denial of Service 9 4
T1495 Firmware Corruption 16 0
T1490 Inhibit System Recovery 12 0
T1498 Network Denial of Service 8 2
T1489 Service Stop 13 0