Mobile Tactics
Mobile Tactics: 14
ID | Name | Description |
---|---|---|
The adversary is trying to get into your device. | ||
The adversary is trying to run malicious code. | ||
The adversary is trying to maintain their foothold. | ||
The adversary is trying to gain higher-level permissions. | ||
The adversary is trying to avoid being detected. | ||
The adversary is trying to steal account names, passwords, or other secrets that enable access to resources. | ||
The adversary is trying to figure out your environment. | ||
The adversary is trying to move through your environment. | ||
The adversary is trying to gather data of interest to their goal. | ||
The adversary is trying to communicate with compromised devices to control them. | ||
The adversary is trying to steal data. | ||
The adversary is trying to manipulate, interrupt, or destroy your devices and data. | ||
The adversary is trying to intercept or manipulate network traffic to or from a device. | ||
The adversary is trying to control or monitor the device using remote services. |