TA0040 Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1561 Disk Wipe 23 2
T1489 Service Stop 22 0
T1491 Defacement 20 2
T1657 Financial Theft 4 0
T1565 Data Manipulation 46 3
T1531 Account Access Removal 8 0
T1486 Data Encrypted for Impact 26 0
T1499 Endpoint Denial of Service 34 4
T1496 Resource Hijacking 12 4
T1485 Data Destruction 35 1
T1498 Network Denial of Service 29 2
T1495 Firmware Corruption 30 0
T1490 Inhibit System Recovery 27 0
T1529 System Shutdown/Reboot 4 0