Skip to content

Data Manipulation

Info

ID: AT-IM002
Tactic: Impact
Sub-techniques: Runtime Data Manipulation, Transmitted Data Manipulation

Data Manipulation

Adversaries may alter the integrity of stored, in-transit, or in-memory data to disrupt normal business operations, cause financial harm, or degrade decision-making processes. This may involve modifying configuration parameters, transaction records, or user data. The stealthier nature of data manipulation (as opposed to outright destruction) can sow confusion and complicate detection, as tampered data may only be discovered long after the compromise.