CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1055Priv Esc4 Mitigations

Process Injection

Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.

Description

Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.

Available Mitigations

This technique can be mitigated using 4 documented security measures.

Application Isolation and SandboxingBehavior Prevention on EndpointPrivileged Account ManagementPrivileged Process Integrity

Quick Info

Technique ID
T1055
Tactic
Priv Esc
Sub-Techniques
12
Mitigations
4

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.