TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Doxing, DoS, and Defacement: Today’s Mainstream Hacktivism Tools

2017-04-12 · Read original ↗

ATT&CK techniques detected

5 predictions
T1498Network Denial of Service
92%
"attacks is the use of illegally subverted computers ( pwned bots ) woven into distributed denial - of - service ( ddos ) botnets. it ’ s much harder to claim the moral high ground when you ddos someone using stolen computing resources. some hacktivists have tried to frame ddos at…"
T1498Network Denial of Service
78%
"for this purpose. 3 ironically, even the original restricted warnings on doxing issued internally to the fbi were leaked by hacktivists. 4 denial of service a fundamental form of physical dissent is the protest march or the sit - in. these are designed to deny usage of some impor…"
T1498.001Direct Network Flood
64%
"attacks is the use of illegally subverted computers ( pwned bots ) woven into distributed denial - of - service ( ddos ) botnets. it ’ s much harder to claim the moral high ground when you ddos someone using stolen computing resources. some hacktivists have tried to frame ddos at…"
T1499Endpoint Denial of Service
41%
"for this purpose. 3 ironically, even the original restricted warnings on doxing issued internally to the fbi were leaked by hacktivists. 4 denial of service a fundamental form of physical dissent is the protest march or the sit - in. these are designed to deny usage of some impor…"
T1499Endpoint Denial of Service
39%
"attacks is the use of illegally subverted computers ( pwned bots ) woven into distributed denial - of - service ( ddos ) botnets. it ’ s much harder to claim the moral high ground when you ddos someone using stolen computing resources. some hacktivists have tried to frame ddos at…"

Summary

Readily available hacking tools provide new ways for civil disobedience groups to antagonize their targets anonymously.