T1491 Defacement

Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. Reasons for Defacement include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of Defacement in order to cause user discomfort, or to pressure compliance with accompanying messages.

View in MITRE ATT&CK®

CSA CCM Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
BCR-08 Backup mitigates T1491 Defacement
Comments
Adversaries may deface visual content through modifying data and files in cloud storage objects, including website files. Periodically backing up data stored in the cloud; ensuring backup confidentiality, integrity, and availability; and verifying data restoration from backup provides data protection and allows for quick recovery from defacement attacks.
References
    DSP-16 Data Retention and Deletion mitigates T1491 Defacement
    Comments
    This control describes the shared responsibility of both the CSP and CSC for securely managing data retention, archiving, and deletion across all cloud service models. Implementation involves establishing secure tools and processes for data retention, configuring backups, enforcing retention policies, and maintaining safeguards within each party’s environment. For this technique, adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. In terms of mitigation, taking regular data backups that can be used to restore organizational data can limit the impact of this technique.
    References
      DCS-18 Datacenter Operations Resilience mitigates T1491 Defacement
      Comments
      Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. This control establishes and regularly evaluates processes, procedures, and technical measures to ensure continuous operations of the datacenter, mitigating attacker techniques such as denial‑of‑service and other availability‑impacting attacks that seek to disrupt business and operational continuity.
      References

        ATT&CK Subtechniques

        Technique ID Technique Name Number of Mappings
        T1491.002 External Defacement 3
        T1491.001 Internal Defacement 2