Scheduled Task/Job

Attackers use the task scheduling feature to execute malicious code, either as a one-time event or at recurring intervals. Task scheduling is used to achieve persistence by running programs at system startup or on a schedule. It can also allow them to run processes using specific user account contexts, perhaps with elevated privileges.

Technique_ID
ATE-037
Severity of Impact
High
Severity of Feasibility
Low
Domain
Automotive
Rail