Network Denial of Service (T1464)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Network Denial of Service

Associated Tactics

  • Impact

Impact (TA0034)

The adversary is trying to manipulate, interrupt, or destroy your devices and data. The impact tactic consists of techniques used by the adversary to execute his or her mission objectives but that do not cleanly fit into another category such as Collection. Mission objectives vary based on each adversary's goals, but examples include toll fraud, destruction of device data, or locking the user out of his or her device until a ransom is paid.

View on ATT&CK

Procedure Examples

Description Source(s)
Chris Matyszczyk. (2014, May 1). FCC: Man used device to jam drivers' cell phone calls. Retrieved November 8, 2018. CNET-Celljammer
David Kravets. (2016, March 10). Man accused of jamming passengers’ cell phones on Chicago subway. Retrieved November 8, 2018. Arstechnica-Celljam
Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017. NIST-SP800187
Matt Richtel. (2007, November 4). Devices Enforce Silence of Cellphones, Illegally. Retrieved November 8, 2018. NYTimes-Celljam
Trevor Mogg. (2015, June 5). Florida teacher punished after signal-jamming his students’ cell phones. Retrieved November 8, 2018. Digitaltrends-Celljam
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue