← Back to Explore
T1491
Defacement
Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. Reasons for [Defacement](https://attack.mitre.org/techniques/T1491) include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of [Defacement](https://attack.mitre.org/techniques/T1491) in order to cause user discomfort, or to pressure compliance with acc...
WindowsIaaSLinuxmacOSESXi
3
Detections
2
Sources
0
Threat Actors
BY SOURCE
2splunk_escu1elastic
PROCEDURES (3)
Suspicious1 detections
Auto-extracted: 1 detections for suspicious
Suspicious1 detections
Auto-extracted: 1 detections for suspicious
Process Creation Monitoring1 detections
Auto-extracted: 1 detections for process creation monitoring