User contributions for SourMilk

Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)

26 January 2023

  • 15:3315:33, 26 January 2023 diff hist +167 N Category:Automated ExfiltrationCreated page with "Category:Exfiltration Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection." current
  • 15:3215:32, 26 January 2023 diff hist +447 N Category:ExfiltrationCreated page with "Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission."
  • 15:3115:31, 26 January 2023 diff hist +481 N System Shutdown/RebootCreated page with "Category:Impact Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via Network Device CLI (e.g. reload). Shutting down or rebooting systems may disrupt access to computer resources for legitimate..." current
  • 15:3115:31, 26 January 2023 diff hist +295 N Service StopCreated page with "Category:Impact Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment." current
  • 15:3015:30, 26 January 2023 diff hist +185 N Resource HijackingCreated page with "Category:Impact Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems, which may impact system and/or hosted service availability." current
  • 15:2915:29, 26 January 2023 diff hist +244 N Inhibit System RecoveryCreated page with "Category:Impact Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery. This may deny access to available backups and recovery options." current
  • 15:2815:28, 26 January 2023 diff hist +490 N Firmware CorruptionCreated page with "Category:Impact Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot, thus denying the availability to use the devices and/or the system. Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices may include the motherboard, hard drive,..." current
  • 15:1715:17, 26 January 2023 diff hist +548 N Data EncryptedCreated page with "Category:Impact Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data per..." current
  • 15:1715:17, 26 January 2023 diff hist +730 N Data DestructionCreated page with "Category:Impact Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives. Common operating system file deletion commands such as del and rm often only remove pointers to files without wiping the contents of the files t..." current
  • 15:1615:16, 26 January 2023 diff hist +376 N Account Access RemovalCreated page with "Category:Impact Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or perform a System Shutdown/Reboot to set malicious changes into place." current

25 January 2023

22 January 2023

21 January 2023

20 January 2023

(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)