Impact (15 techniques)
Manipulating, interrupting, or destroying systems and data.
The Impact tactic groups MITRE ATT&CK techniques used by adversaries to manipulating, interrupting, or destroying systems and data. Each technique below has its own page with detection guidance, platforms, and sub-techniques.
- T1485 — Data Destruction Containers, ESXi, IaaS, Linux, macOS, Windows
- T1486 — Data Encrypted for Impact ESXi, IaaS, Linux, macOS, Windows
- T1489 — Service Stop ESXi, IaaS, Linux, macOS, Windows
- T1490 — Inhibit System Recovery Containers, ESXi, IaaS, Linux, macOS, Network Devices, Windows
- T1491 — Defacement Windows, IaaS, Linux, macOS, ESXi
- T1495 — Firmware Corruption Linux, macOS, Network Devices, Windows
- T1496 — Resource Hijacking Windows, IaaS, Linux, macOS, Containers, SaaS
- T1498 — Network Denial of Service Windows, IaaS, Linux, macOS, Containers
- T1499 — Endpoint Denial of Service Windows, Linux, macOS, Containers, IaaS
- T1529 — System Shutdown/Reboot ESXi, Linux, macOS, Network Devices, Windows
- T1531 — Account Access Removal Linux, macOS, Windows, SaaS, IaaS, Office Suite, ESXi
- T1561 — Disk Wipe Linux, macOS, Windows, Network Devices
- T1565 — Data Manipulation Linux, macOS, Windows
- T1657 — Financial Theft Linux, macOS, Office Suite, SaaS, Windows
- T1667 — Email Bombing Linux, Office Suite, Windows, macOS
Detection engineering training, taught by practitioners.
Learn how to build real detections across the MITRE ATT&CK framework.
View Courses