- AR1
- -MT012
- -MT012.007
Sexual Extortion - AR1
Contributor: The ITM Team @ - Subsection MT012.007
- AR5
- -AF008
- -AF008.001
Image Steganography - AR5
Contributor: The ITM Team @ - Subsection AF008.001
- AR4
- -IF022
- -IF022.004
Payment Card Data Leakage - AR4
Contributor: The ITM Team @ - Subsection IF022.004
- AR3
- -PR024
- -PR024.001
Privilege Escalation through Kerberoasting - AR3
Contributor: The ITM Team @ - Subsection PR024.001
- AR1
- -MT015
- -MT015.001
Opportunism - AR1
Contributor: The ITM Team @ - Subsection MT015.001
- AR4
- -IF009
- -IF009.005
Anti-Sleep Software - AR4
Contributor: The ITM Team @ - Subsection IF009.005
- AR4
- -IF001
- -IF001.006
Exfiltration via Generative AI Platform - AR4
Contributor: The ITM Team @ - Subsection IF001.006
- AR4
- -IF009
- -IF009.006
Installing Crypto Mining Software - AR4
Contributor: The ITM Team @ - Subsection IF009.006
- AR4
- -IF014
- -IF014.007
Creation of Cloud Resources - AR4
Contributor: The ITM Team @ - Subsection IF014.007
- Preventions
- -PV001
No Ready System-Level Mitigation - PV001
Contributor: The ITM Team @ - Prevention PV001