- AR5
- -AF028
- -AF028.005
Connectivity Obstruction - AR5
Contributor: The ITM Team @ - Subsection AF028.005
- AR3
- -PR018
- -PR018.008
Bypassing Network Segmentation - AR3
Contributor: The ITM Team @ - Subsection PR018.008
- AR1
- -MT012
- -MT012.008
Threats of Violence or Physical Harm - AR1
Contributor: The ITM Team @ - Subsection MT012.008
- AR4
- -IF016
- -IF016.008
Prepaid Debit Cards - AR4
Contributor: The ITM Team @ - Subsection IF016.008
- AR4
- -IF016
- -IF016.009
Creation of Fictitious Work Orders - AR4
Contributor: The ITM Team @ - Subsection IF016.009
- AR4
- -IF014
- -IF014.008
Modification of Cloud Resources - AR4
Contributor: The ITM Team @ - Subsection IF014.008
- AR4
- -IF022
- -IF022.006
Credential Leak - AR4
Contributor: The ITM Team @ - Subsection IF022.006
- AR1
- -MT005
- -MT005.004
Financial Self-Interest - AR1
Contributor: The ITM Team @ - Subsection MT005.004
- AR1
- -MT005
- -MT005.005
Extortion - AR1
Contributor: The ITM Team @ - Subsection MT005.005
- AR4
- -IF001
- -IF001.008
Exfiltration via File-Sharing Platform - AR4
Contributor: The ITM Team @ - Subsection IF001.008