Threat Intelligence
Description
Distributed Denial of Services (DDoS) | Attack that attempts to overwhelm victim infrastructure and disrupt service. |
Hack & Leak | Attack directly leveraging, or otherwise benefiting from, traditional intrusion capabilities to covertly obtain and publish exfiltrated materials in a manner intended to influence target audiences. Leaks may also be used to disseminate altered or forged documents. Actors may also "leak" documents obtained through alternative means while falsely claiming successful intrusion operations. |
Website Defacements | Actors compromise a website and modify or replace its landing page with content intended to influence target audiences. Website defacements are a common tactic used by hacktivists. |
Doxing | Actors disseminate personally identifiable information (PII) of a victim; disseminated information may not necessarily have been collected through data breaches or other intrusion activity. In most cases, doxing does not result in high impact to victims, with the exception of cases inciting to violence. |
Network Intrusion | The attacker gains access to a specific network and either offers access or announces further disruptive activity. This includes, for instance, accessing user interfaces for industrial control systems and modifying parameters that may result in physical damage. |
Published: 2024-06-27T14:00:00