- AR4
- -IF002
- -IF002.008
Exfiltration via USB to Mobile Device - AR4
Contributor: The ITM Team @ - Subsection IF002.008
- AR4
- -IF014
- -IF014.006
Deletion of Other IT Resources - AR4
Contributor: The ITM Team @ - Subsection IF014.006
- AR4
- -IF002
- -IF002.009
Exfiltration via Disk Media - AR4
Contributor: The ITM Team @ - Subsection IF002.009
- AR4
- -IF018
- -IF018.001
Exfiltration via AI Chatbot Platform History - AR4
Contributor: The ITM Team @ - Subsection IF018.001
- AR3
- -PR006
- -PR006.004
Security Enumeration via Network Activity - AR3
Contributor: The ITM Team @ - Subsection PR006.004
- AR5
- -AF018
- -AF018.001
Endpoint Tripwires - AR5
Contributor: The ITM Team @ - Subsection AF018.001
- AR5
- -AF018
- -AF018.003
Canary Tokens - AR5
Contributor: The ITM Team @ - Subsection AF018.003
- AR1
- -MT012
- -MT012.007
Sexual Extortion - AR1
Contributor: The ITM Team @ - Subsection MT012.007
- AR5
- -AF008
- -AF008.001
Image Steganography - AR5
Contributor: The ITM Team @ - Subsection AF008.001
- Preventions
- -PV001
No Ready System-Level Mitigation - PV001
Contributor: The ITM Team @ - Prevention PV001