Endpoint Denial of Service (T1642)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Endpoint Denial of Service

Associated Tactics

  • Impact

Impact (TA0034)

The adversary is trying to manipulate, interrupt, or destroy your devices and data. The impact tactic consists of techniques used by the adversary to execute his or her mission objectives but that do not cleanly fit into another category such as Collection. Mission objectives vary based on each adversary's goals, but examples include toll fraud, destruction of device data, or locking the user out of his or her device until a ransom is paid.

View on ATT&CK

Procedure Examples

Description Source(s)
Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016. Xiao-KeyRaider
Google. (n.d.). DevicePolicyManager. Retrieved October 1, 2019. Android resetPassword