mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats

MITRE ATT&CK Navigator

Enterprise ATT&CK v18 -- 14 Tactics, 93 Techniques

93

Total Techniques

46

Ransomware-Used

16

Critical Severity

Ransomware Technique Coverage by Tactic

Reconnaissance

3/10

Resource Development

2/7

Initial Access

5/9

Execution

5/6

Persistence

3/7

Privilege Escalation

3/4

Defense Evasion

3/7

Credential Access

3/6

Discovery

6/8

Lateral Movement

3/5

Collection

3/5

Command and Control

3/7

Exfiltration

1/5

Impact

3/7
Severity: Critical High Medium Low
Top Ransomware Techniques
1

Data Encrypted for Impact

T1486

95%
2

Phishing

T1566

90%
3

Command and Scripting Interpreter

T1059

90%
4

Exploit Public-Facing Application

T1190

85%
5

Valid Accounts

T1078

85%
6

Valid Accounts

T1078

85%
7

File and Directory Discovery

T1083

85%
8

Ingress Tool Transfer

T1105

85%
mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel