Skip to content

M0816 Mitigation Limited or Not Effective

This type of attack technique cannot be easily mitigated with preventative controls since it is based on the abuse of system features.

Item Value
ID M0816
Version 1.0
Created 11 September 2020
Last Modified 24 October 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
ics T0823 Graphical User Interface Once an adversary has access to a remote GUI they can abuse system features, such as required HMI functions.
ics T0877 I/O Image This technique may not be effectively mitigated against, consider controls for assets and processes that lead to the use of this technique.
ics T0835 Manipulate I/O Image This technique may not be effectively mitigated against, consider controls for assets and processes that lead to the use of this technique.
ics T0801 Monitor Process State This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ics T0840 Network Connection Enumeration Network connection enumeration is likely obtained by using common system tools (e.g., netstat, ipconfig).
ics T0852 Screen Capture Preventing screen capture on a device may require disabling various system calls supported by the operating systems (e.g., Microsoft WindowsGraphicsCaputer APIs), however, these may be needed for other critical applications.