Stored Data Manipulation
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of...
BY SOURCE
PROCEDURES (13)
Auto-extracted: 5 detections for general monitoring
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for cloud