External Defacement (T1491.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Impact

Impact (TA0040)

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View on ATT&CK

Procedure Examples

Description Source(s)
FireEye. (n.d.). Retrieved April 19, 2019. FireEye Cyber Threats to Media Industries
Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019. Kevin Mandia Statement to US Senate Committee on Intelligence
Andy. (2018, May 12). ‘Anonymous’ Hackers Deface Russian Govt. Site to Protest Web-Blocking (NSFW). Retrieved April 19, 2019. Anonymous Hackers Deface Russian Govt Site
Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019. Trend Micro Deep Dive Into Defacement