Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. ransomwareUpdated Jan 06, 2026

    a malware designed to deny a user or organization access to files on their computer

  2. recoveryUpdated Jan 06, 2026

    The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.

  3. red teamUpdated Jan 06, 2026

    A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.

  4. red team exerciseUpdated Jan 06, 2026

    An exercise, reflecting real world conditions, that is conducted as a simulated attempt by an adversary to attack or exploit vulnerabilities in an enterprise's information systems.

  5. redundancyUpdated Jan 06, 2026

    Additional or alternative systems, sub systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub system, asset, or process.

  6. Remote Access SoftwareUpdated Jan 06, 2026

    Adversaries may use legitimate remote access software, such as , , , , etc., to establish an interactive command and control channel to target mobile devices.

  7. An adversary may use access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM)/mobile device management (MDM) server console to track the location of mobile devices managed by the service.(Citation: Krebs Location)

  8. Remote ServicesUpdated Jan 06, 2026

    Adversaries may leverage remote services to move between assets and network segments. These services are often used to allow operators to interact with systems remotely within the network, some examples are RDP, SMB, SSH, and other similar mechanisms. (Citation: Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017) (Citation: Dragos December 2017) (Citation: Joe Slowik April 2019)

  9. Remote System DiscoveryUpdated Jan 06, 2026

    Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used. (Citation: Enterprise ATT&CK January 2018)

  10. An adversary may attempt to get detailed information about remote systems and their peripherals, such as make/model, role, and configuration. Adversaries may use information from Remote System Information Discovery to aid in targeting and shaping follow on behaviors. For example, the system's operational role and model information can dictate whether it is a relevant target for the adversary's operational objectives. In addition, the system's configuration may be used to scope subsequent technique usage.

  11. RemotingUpdated Jan 06, 2026

    A technology that allows a program to interact with the internals of another program running on a different machine

  12. Adversaries may move onto systems, such as those separated from the enterprise network, by copying malware to removable media which is inserted into the control systems environment. The adversary may rely on unknowing trusted third parties, such as suppliers or contractors with access privileges, to introduce the removable media. This technique enables initial access to target devices that never connect to untrusted networks, but are physically accessible.

  13. RepojackingUpdated Jan 06, 2026

    intentionally taking over the account of an owner or maintainer who hosts a repository

  14. resilienceUpdated Jan 06, 2026

    The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.

  15. responseUpdated Jan 06, 2026

    The activities that address the short term, direct effects of an incident and may also support short term recovery.

  16. Revert Cloud InstanceUpdated Jan 03, 2026

    An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage snapshots through the cloud management dashboard or cloud APIs.

  17. riskUpdated Jan 06, 2026

    The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.

  18. risk analysisUpdated Jan 06, 2026

    The systematic examination of the components and characteristics of risk.

  19. risk assessmentUpdated Jan 06, 2026

    The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making.

  20. risk-based data managementUpdated Jan 06, 2026

    A structured approach to managing risks to data and information by which an organization selects and applies appropriate security controls in compliance with policy and commensurate with the sensitivity and value of the data.

  21. risk managementUpdated Jan 06, 2026

    The process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.

  22. Rogue MasterUpdated Jan 06, 2026

    Adversaries may setup a rogue master to leverage control server functions to communicate with outstations. A rogue master can be used to send legitimate control messages to other control system devices, affecting processes in unintended ways. It may also be used to disrupt network communications by capturing and receiving the network traffic meant for the actual master. Impersonating a master may also allow an adversary to avoid detection.

  23. RootkitUpdated Jan 06, 2026

    Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows Rootkits)

  24. Rundll32Updated Jan 03, 2026

    Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. Shared Modules), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: <code rundll32.exe {DLLname, DLLfunction}</code ).