The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.
View in MITRE ATT&CK®Technique ID | Technique Name | Number of Mappings | Number of Subtechniques |
---|---|---|---|
T1561 | Disk Wipe | 23 | 2 |
T1489 | Service Stop | 22 | 0 |
T1491 | Defacement | 20 | 2 |
T1657 | Financial Theft | 4 | 0 |
T1565 | Data Manipulation | 46 | 3 |
T1531 | Account Access Removal | 8 | 0 |
T1486 | Data Encrypted for Impact | 26 | 0 |
T1499 | Endpoint Denial of Service | 34 | 4 |
T1496 | Resource Hijacking | 12 | 4 |
T1485 | Data Destruction | 35 | 1 |
T1498 | Network Denial of Service | 29 | 2 |
T1495 | Firmware Corruption | 30 | 0 |
T1490 | Inhibit System Recovery | 27 | 0 |
T1529 | System Shutdown/Reboot | 4 | 0 |