CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1674Execution1 Mitigations

Input Injection

Adversaries may simulate keystrokes on a victim's computer by various means to perform any type of action on behalf of the user.

Description

Adversaries may simulate keystrokes on a victim's computer by various means to perform any type of action on behalf of the user.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Behavior Prevention on Endpoint

Quick Info

Technique ID
T1674
Tactic
Execution
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.