← Back to Explore
T1565.002
Transmitted Data Manipulation
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool...
LinuxmacOSWindows
3
Detections
2
Sources
1
Threat Actors
BY SOURCE
2sigma1elastic
PROCEDURES (2)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring
Network Connection Monitoring1 detections
Auto-extracted: 1 detections for network connection monitoring