ABOUT
Overview
Use Cases
Mapping Methodology
Scoring Rubric
Related Projects
ATT&CK OBJECTS
Matrix
Tactics
Techniques
MAPPING FRAMEWORKS
About Mappings
Amazon Web Services (AWS)
Azure
CVE
Google Cloud Platform (GCP)
Intel vPro
NIST 800-53
M365
VERIS
You're currently viewing ATT&CK Version 16.1 Enterprise and VERIS 1.4.0.
Change versions here.
Home
Mapping Frameworks
VERIS Home
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
VERIS
action.hacking.variety.Hijack
Mappings
Mappings
ATT&CK Version
16.1
ATT&CK Domain
Enterprise
VERIS
1.4.0
Change Versions
Capability ID
Capability Description
Mapping Type
ATT&CK ID
ATT&CK Name
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1185
Browser Session Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1496
Resource Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1496.001
Resource Hijacking: Compute Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1496.002
Resource Hijacking: Bandwidth Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1496.003
Resource Hijacking: SMS Pumping
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1496.004
Resource Hijacking: Cloud Service Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1563
Remote Service Session Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1563.001
Remote Service Session Hijacking: SSH Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1563.002
Remote Service Session Hijacking: RDP Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574
Hijack Execution Flow
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574.001
Hijack Execution Flow: DLL Search Order Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574.002
Hijack Execution Flow: DLL Side-Loading
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574.004
Hijack Execution Flow: Dylib Hijacking
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574.005
Hijack Execution Flow: Executable Installer File Permissions Weakness
action.hacking.variety.Hijack
To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes)
related-to
T1574.014
AppDomainManager