| Brand Monitoring |
None |
None |
| DNS Amplification Attacks |
Network Denial of Service, Reflection Amplification |
Impact |
| Data Protection |
Exfiltration Over Unencrypted Non-C2 Protocol |
Exfiltration |
| Information Sabotage |
Indicator Removal, Clear Windows Event Logs |
Defense Evasion |
| Netsh Abuse |
File and Directory Permissions Modification, System Network Connections Discovery, System Owner/User Discovery, System Shutdown/Reboot, System Network Configuration Discovery, Command and Scripting Interpreter |
Defense Evasion |