Data Manipulation
Info
ID: AT-IM002
Tactic: Impact
Sub-techniques: Runtime Data Manipulation, Transmitted Data Manipulation
Data Manipulation
Adversaries may alter the integrity of stored, in-transit, or in-memory data to disrupt normal business operations, cause financial harm, or degrade decision-making processes. This may involve modifying configuration parameters, transaction records, or user data. The stealthier nature of data manipulation (as opposed to outright destruction) can sow confusion and complicate detection, as tampered data may only be discovered long after the compromise.