Skip to content

Impact

Impact consists of techniques that adversaries use to disrupt availability or compromise integrity of your data

ID Name
MS-T839 Data corruption
MS-T838 Data encryption for impact (Ransomware)
MS-T837 Data manipulation