- Detections
- -DT148
Installed Software via Registry - DT148
Contributor: The ITM Team @ - Detection DT148
- Detections
- -DT149
Unauthorized USB HID Device Connections - DT149
Contributor: The ITM Team @ - Detection DT149
- Detections
- -DT150
Discovery of IP-KVM Management Interfaces on Internal Networks - DT150
Contributor: The ITM Team @ - Detection DT150
- Detections
- -DT151
Internal Whistleblowing - DT151
Contributor: The ITM Team @ - Detection DT151
- Detections
- -DT152
Financial Auditing - DT152
Contributor: The ITM Team @ - Detection DT152
- Chains
- -Documented
Yahoo 2022 Data Exfiltration Insider Incident
Contributor: The ITM Team @ - Chain: ITM-V2:MT003:MT005:MT021:ME005.001:ME006.006:ME007:ME024.006:PR002.001:PR004.002:PR025:IF002.001:IF022.001
- Chains
- -Documented
KnowBe4 2024 Fake IT Worker Insider Incident
Contributor: The ITM Team @ - Chain: ITM-V2:MT006:MT003:ME024:IF009:IF027:AF028.003
- Chains
- -Documented
CrowdStrike 2025 Internal Access Sharing Insider Incident
Contributor: The ITM Team @ - Chain: ITM-V2:MT005:ME024:PR028.001:IF011
- Chains
- -Documented
Meta 2024 Data Exfiltration Insider Incident
Contributor: The ITM Team @ - Chain: ITM-V2:MT003:MT005:MT021:ME024:ME007:PR004.002:PR025:IF001.001:IF022.001
- Chains
- -Documented
U.S. DOS 2025 Data Exfiltration Insider Incident
Contributor: The ITM Team @ - Chain: ITM-V2:MT006:ME024.006:ME013:PR008:IF003.001