This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Group: XENOTIME, TEMP.Veles + ([[Group/G0001|XENOTIME]])
- Group: Dragonfly, Energetic Bear, ... + ([[Group/G0002|Dragonfly]])
- Group: APT33, Elfin, MAGNALLIUM + ([[Group/G0003|APT33]])
- Group: HEXANE, Lyceum + ([[Group/G0005|HEXANE]])
- Group: Dragonfly 2.0, Berserk Bear, DYMALLOY + ([[Group/G0006|Dragonfly 2.0]])
- Group: Sandworm Team, ELECTRUM, ... + ([[Group/G0007|Sandworm Team]])
- Group: Lazarus group, COVELLITE, ... + ([[Group/G0008|Lazarus group]])
- Group: ALLANITE, Palmetto Fusion + ([[Group/G0009|ALLANITE]])
- Group: OilRig, CHRYSENE, ... + ([[Group/G0010|OilRig]])
- Human-Machine Interface + ([[Human-Machine Interface]])
- Impact + ([[Impact]])
- Impair Process Control + ([[Impair Process Control]])
- Inhibit Response Function + ([[Inhibit Response Function]])
- Initial Access + ([[Initial Access]])
- Input/Output Server + ([[Input/Output Server]])
- Lateral Movement + ([[Lateral Movement]])
- Level 0 + ([[Level 0]])
- Level 1 + ([[Level 1]])
- Level 2 + ([[Level 2]])
- Authorization Enforcement + ([[Mitigation/M0800]])
- Access Management + ([[Mitigation/M0801]])
- Communication Authenticity + ([[Mitigation/M0802]])
- Data Loss Prevention + ([[Mitigation/M0803]])
- Human User Authentication + ([[Mitigation/M0804]])
- Mechanical Protection Layers + ([[Mitigation/M0805]])
- Minimize Wireless Signal Propagation + ([[Mitigation/M0806]])
- Network Allowlists + ([[Mitigation/M0807]])
- Encrypt Network Traffic + ([[Mitigation/M0808]])
- Operational Information Confidentiality + ([[Mitigation/M0809]])
- Out-of-Band Communications Channel + ([[Mitigation/M0810]])
- Redundancy of Service + ([[Mitigation/M0811]])
- Safety Instrumented Systems + ([[Mitigation/M0812]])
- Software Process and Device Authentication + ([[Mitigation/M0813]])
- Static Network Configuration + ([[Mitigation/M0814]])
- Watchdog Timers + ([[Mitigation/M0815]])
- Mitigation Limited or Not Effective + ([[Mitigation/M0816]])
- Supply Chain Management + ([[Mitigation/M0817]])
- Application Developer Guidance + ([[Mitigation/M0913]])
- Active Directory Configuration + ([[Mitigation/M0915]])
- Vulnerability Scanning + ([[Mitigation/M0916]])
- User Training + ([[Mitigation/M0917]])