EXPLORE
← Back to Explore
T1565.002

Transmitted Data Manipulation

Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool...

LinuxmacOSWindows
3
Detections
2
Sources
1
Threat Actors

BY SOURCE

2sigma1elastic

PROCEDURES (2)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Network Connection Monitoring1 detections

Auto-extracted: 1 detections for network connection monitoring

THREAT ACTORS (1)

DETECTIONS (3)