CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1137Persistence2 Mitigations

Office Application Startup

Adversaries may leverage Microsoft Office-based applications for persistence between startups.

Description

Adversaries may leverage Microsoft Office-based applications for persistence between startups.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Disable or Remove Feature or ProgramSoftware Configuration

Quick Info

Technique ID
T1137
Sub-Techniques
6
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.