MITRE ATT&CK
Framework di tattiche e tecniche degli avversari
714
Tecniche
14
Tattiche
0
Mitigazioni
4.632
Actor-Technique Links
MITRE ATT&CK 714
| ID | Tecniche | Tattica | Piattaforme | Threat Actors | Azioni |
|---|---|---|---|---|---|
| T1222 | File and Directory Permissions Modification | Stealth, Defense Impairme... | ESXi, Linux, macOS... | 0 | |
| T1222.001 | Windows Permissions Sub | Stealth, Defense Impairme... | Windows | 2 | |
| T1222.002 | Linux and Mac Permissions Sub | Stealth, Defense Impairme... | Linux, macOS | 3 | |
| T1480 | Execution Guardrails | Stealth | ESXi, Linux, macOS... | 4 | |
| T1480.001 | Environmental Keying Sub | Stealth | Linux, Windows, macO | 2 | |
| T1480.002 | Mutual Exclusion Sub | Stealth | Linux, macOS, Window | 2 | |
| T1482 | Domain Trust Discovery | Discovery | Windows | 10 | |
| T1484 | Domain or Tenant Policy Modification | Privilege Escalation, Ste... | Windows, Identity Pr | 0 | |
| T1484.001 | Group Policy Modification Sub | Privilege Escalation, Ste... | Windows | 5 | |
| T1484.002 | Trust Modification Sub | Privilege Escalation, Ste... | Identity Provider, W | 2 | |
| T1485 | Data Destruction | Impact | Containers, ESXi, Ia... | 6 | |
| T1485.001 | Lifecycle-Triggered Deletion Sub | Impact | IaaS | 0 | |
| T1486 | Data Encrypted for Impact | Impact | ESXi, IaaS, Linux... | 18 | |
| T1489 | Service Stop | Impact | ESXi, IaaS, Linux... | 7 | |
| T1490 | Inhibit System Recovery | Impact | Containers, ESXi, Ia... | 7 | |
| T1491 | Defacement | Impact | Windows, IaaS, Linux... | 0 | |
| T1491.001 | Internal Defacement Sub | Impact | ESXi, Linux, macOS... | 3 | |
| T1491.002 | External Defacement Sub | Impact | Windows, IaaS, Linux... | 2 | |
| T1495 | Firmware Corruption | Impact | Linux, macOS, Networ... | 0 | |
| T1496 | Resource Hijacking | Impact | Windows, IaaS, Linux... | 0 | |
| T1496.001 | Compute Hijacking Sub | Impact | Windows, IaaS, Linux... | 4 | |
| T1496.002 | Bandwidth Hijacking Sub | Impact | Linux, Windows, macO... | 0 | |
| T1496.003 | SMS Pumping Sub | Impact | SaaS | 0 | |
| T1496.004 | Cloud Service Hijacking Sub | Impact | SaaS | 0 | |
| T1497 | Virtualization/Sandbox Evasion | Stealth, Discovery | Linux, macOS, Window | 3 |