Critical Infrastructure Cybersecurity Framework
T1657Impact1 Mitigations

Financial Theft

Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods.

Description

Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

User Training

Quick Info

Technique ID
T1657
Tactic
Impact
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.