EXPLORE
← Back to Explore
T1565

Data Manipulation

Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant Beetle Jan 2022) By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an ...

LinuxmacOSWindows
16
Detections
2
Sources
1
Threat Actors

BY SOURCE

13elastic3sigma

PROCEDURES (11)

General Monitoring3 detections

Auto-extracted: 3 detections for general monitoring

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Cloud2 detections

Auto-extracted: 2 detections for cloud

Inject2 detections

Auto-extracted: 2 detections for inject

Aws1 detections

Auto-extracted: 1 detections for aws

Dns1 detections

Auto-extracted: 1 detections for dns

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Encrypt1 detections

Auto-extracted: 1 detections for encrypt

Dns1 detections

Auto-extracted: 1 detections for dns

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Inject1 detections

Auto-extracted: 1 detections for inject

THREAT ACTORS (1)

DETECTIONS (16)