Digital Mosquitoes
MITRE ATT&CK Tactic | Description |
---|---|
Initial Access | Gain initial access to a system or network |
Execution | Execute code on a victim system |
Persistence | Establish persistence within a system to access later |
Privilege Escalation | Attempt to obtain higher privileges on a system |
Defense Evasion | Evade detection and deceive defenders |
Credential Access | Gain access to credentials |
Discovery | Gather information about the system or network to move laterally |
Lateral Movement | Move laterally within a network to achieve their objectives |
Collection | Collect data from compromised systems |
Collection | Collect data from compromised systems |
Command and Control (C2) | Maintain communication channels with compromised systems. |
Exfiltration | Collect data from compromised systems |
Impact | Take actions that affect the availability, integrity, or confidentiality of systems or data |