MITRE ATT&CK

Adversary tactics and techniques framework

714
Techniques
14
Tactics
0
Mitigations
4.632
Actor-Technique Links
MITRE ATT&CK 714
ID Techniques Tactic Platforms Threat Actors Actions
T1222 File and Directory Permissions Modification Stealth, Defense Impairme... ESXi, Linux, macOS... 0
T1222.001 Windows Permissions Sub Stealth, Defense Impairme... Windows 2
T1222.002 Linux and Mac Permissions Sub Stealth, Defense Impairme... Linux, macOS 3
T1480 Execution Guardrails Stealth ESXi, Linux, macOS... 4
T1480.001 Environmental Keying Sub Stealth Linux, Windows, macO 2
T1480.002 Mutual Exclusion Sub Stealth Linux, macOS, Window 2
T1482 Domain Trust Discovery Discovery Windows 10
T1484 Domain or Tenant Policy Modification Privilege Escalation, Ste... Windows, Identity Pr 0
T1484.001 Group Policy Modification Sub Privilege Escalation, Ste... Windows 5
T1484.002 Trust Modification Sub Privilege Escalation, Ste... Identity Provider, W 2
T1485 Data Destruction Impact Containers, ESXi, Ia... 6
T1485.001 Lifecycle-Triggered Deletion Sub Impact IaaS 0
T1486 Data Encrypted for Impact Impact ESXi, IaaS, Linux... 18
T1489 Service Stop Impact ESXi, IaaS, Linux... 7
T1490 Inhibit System Recovery Impact Containers, ESXi, Ia... 7
T1491 Defacement Impact Windows, IaaS, Linux... 0
T1491.001 Internal Defacement Sub Impact ESXi, Linux, macOS... 3
T1491.002 External Defacement Sub Impact Windows, IaaS, Linux... 2
T1495 Firmware Corruption Impact Linux, macOS, Networ... 0
T1496 Resource Hijacking Impact Windows, IaaS, Linux... 0
T1496.001 Compute Hijacking Sub Impact Windows, IaaS, Linux... 4
T1496.002 Bandwidth Hijacking Sub Impact Linux, Windows, macO... 0
T1496.003 SMS Pumping Sub Impact SaaS 0
T1496.004 Cloud Service Hijacking Sub Impact SaaS 0
T1497 Virtualization/Sandbox Evasion Stealth, Discovery Linux, macOS, Window 3