Statements (20)
Predicate | Object |
---|---|
gptkbp:instanceOf |
MITRE ATT&CK technique
|
gptkbp:belongsToTactic |
gptkb:Command_and_Control
|
gptkbp:citation |
https://attack.mitre.org/techniques/T1219/
|
gptkbp:describes |
Adversaries may use legitimate remote access software to establish a connection to a target system and maintain persistence.
|
gptkbp:detects |
Monitor for installation and use of remote access software.
|
gptkbp:discoveredBy |
2018
|
gptkbp:example |
gptkb:LogMeIn
gptkb:TeamViewer gptkb:GoToMyPC gptkb:AnyDesk |
https://www.w3.org/2000/01/rdf-schema#label |
MITRE ATT&CK T1219
|
gptkbp:mitigatedBy |
Restrict installation of unauthorized remote access tools.
|
gptkbp:partOf |
gptkb:MITRE_ATT&CK_framework
|
gptkbp:platforms |
gptkb:Windows
gptkb:macOS gptkb:Linux |
gptkbp:technique |
T1219
|
gptkbp:techniqueName |
Remote Access Software
|
gptkbp:bfsParent |
gptkb:Fallchill
|
gptkbp:bfsLayer |
7
|