Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 518

Impact (MITRE Tactic)

What is Impact (MITRE Tactic)?

Impact (MITRE Tactic)The MITRE ATT&CK tactic (TA0040) covering techniques whose goal is to disrupt availability or integrity of systems, data, or business processes.


Impact (MITRE ATT&CK tactic TA0040) is the final stage in many intrusions and captures techniques designed to disrupt, deny, degrade, or destroy. Examples include data encryption for ransom (ransomware), data destruction or wipers, disk wipe, defacement, denial of service, account access removal (locking out legitimate admins), resource hijacking such as cryptomining, and inhibiting system recovery by deleting Volume Shadow Copies. Impact techniques are often what makes an incident visible to business leaders and regulators, and they are commonly preceded by exfiltration in double-extortion scenarios. Defenders focus on backups (3-2-1), immutable storage, business continuity plans, EDR ransomware canaries, and rapid containment to minimise blast radius.

Examples

  1. 01

    Deploying LockBit across a Windows estate to encrypt servers and demand a ransom.

  2. 02

    A wiper destroying boot sectors and Volume Shadow Copies to prevent recovery.

Frequently asked questions

What is Impact (MITRE Tactic)?

The MITRE ATT&CK tactic (TA0040) covering techniques whose goal is to disrupt availability or integrity of systems, data, or business processes. It belongs to the Defense & Operations category of cybersecurity.

What does Impact (MITRE Tactic) mean?

The MITRE ATT&CK tactic (TA0040) covering techniques whose goal is to disrupt availability or integrity of systems, data, or business processes.

How does Impact (MITRE Tactic) work?

Impact (MITRE ATT&CK tactic TA0040) is the final stage in many intrusions and captures techniques designed to disrupt, deny, degrade, or destroy. Examples include data encryption for ransom (ransomware), data destruction or wipers, disk wipe, defacement, denial of service, account access removal (locking out legitimate admins), resource hijacking such as cryptomining, and inhibiting system recovery by deleting Volume Shadow Copies. Impact techniques are often what makes an incident visible to business leaders and regulators, and they are commonly preceded by exfiltration in double-extortion scenarios. Defenders focus on backups (3-2-1), immutable storage, business continuity plans, EDR ransomware canaries, and rapid containment to minimise blast radius.

How do you defend against Impact (MITRE Tactic)?

Defences for Impact (MITRE Tactic) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Impact (MITRE Tactic)?

Common alternative names include: Impact tactic, TA0040.

Related terms