TA0040 Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1561 Disk Wipe 23 2
T1489 Service Stop 23 0
T1491 Defacement 20 2
T1657 Financial Theft 5 0
T1565 Data Manipulation 49 3
T1531 Account Access Removal 15 0
T1486 Data Encrypted for Impact 43 0
T1499 Endpoint Denial of Service 41 4
T1496 Resource Hijacking 33 4
T1485 Data Destruction 43 1
T1498 Network Denial of Service 38 2
T1495 Firmware Corruption 32 0
T1490 Inhibit System Recovery 30 0
T1529 System Shutdown/Reboot 4 0