During a post-breach analysis, a cybersecurity analyst discovers that an attacker leveraged scheduled tasks to execute malicious payloads after initial compromise. Which MITRE ATT&CK tactic BEST describes this observed behavior?
The correct answer is 'Persistence'. The MITRE ATT&CK framework includes the 'Persistence' tactic, which encompasses techniques that adversaries use to maintain their foothold on systems across restarts, changed credentials, and other interruptions that could cut off their access. Using scheduled tasks for executing payloads fits within this tactic, as it ensures that the attacker's code will run continuously or at a predefined time. 'Privilege Escalation' involves gaining higher-level permissions on a system or network, 'Credential Access' represents techniques for stealing credentials, and 'Discovery' is focused on exploring the system and network environment. These do not accurately describe the use of scheduled tasks for maintaining access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Scheduled Tasks in cybersecurity?
Open an interactive chat with Bash
Can you explain the MITRE ATT&CK framework?
Open an interactive chat with Bash
What does Persistence mean in the context of cybersecurity?