8
High
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection |
---|---|---|---|---|---|---|---|---|
5 Reports | 15 Reports | 10 Reports | 8 Reports | 20 Reports | 12 Reports | 18 Reports | 6 Reports | 9 Reports |
Phishing Drive-by Compromise Valid Accounts | Command and Scripting Interpreter Scheduled Task/Job | Browser Extensions Boot or Logon Initialization Scripts | Process Injection Access Token Manipulation | Obfuscated Files or Information Modify Registry | OS Credential Dumping Brute Force | System Information Discovery File and Directory Discovery | Remote Services Exploitation of Remote Services | Clipboard Data Automated Collection |