text
stringlengths
0
3.15k
Description: Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in Disable or Modify System Firewall. Cloud environments typically utilize restrictive security groups and f...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: Monitor cloud logs for modification or creation of new security groups or firewall rules.
More Information: https://attack.mitre.org/techniques/T1562/007
Technique ID: T1562.008
Name: Impair Defenses: Disable or Modify Cloud Logs
Description: An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environ...
Tactics: Defense Evasion
Platforms Affected: Azure AD, Google Workspace, IaaS, Office 365, SaaS
Detection Strategies: Monitor logs for API calls to disable logging. In AWS, monitor for: StopLogging and DeleteTrail. In GCP, monitor for: google.logging.v2.ConfigServiceV2.UpdateSink. In Azure, monitor for az monitor diagnostic-settings delete. Additionally, a sudden loss of a log source may indicate that it has been...
More Information: https://attack.mitre.org/techniques/T1562/008
Technique ID: T1562.001
Name: Impair Defenses: Disable or Modify Tools
Description: Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or othe...
Tactics: Defense Evasion
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS
Detection Strategies: Monitor processes and command-line arguments to see if security tools/services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Monitoring for changes to other known features used by deployed security tools may...
More Information: https://attack.mitre.org/techniques/T1562/001
Technique ID: T1656
Name: Impersonation
Description: Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via Phishing for Information, Phishing, or Internal Spearphishing) while impersonating a known sender such...
Tactics: Defense Evasion
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1656
Technique ID: T1070
Name: Indicator Removal
Description: Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to ...
Tactics: Defense Evasion
Platforms Affected: Containers, Google Workspace, Linux, Network, Office 365, Windows, macOS
Detection Strategies: File system monitoring may be used to detect improper deletion or modification of indicator files. Events not stored on the file system may require different detection mechanisms.
More Information: https://attack.mitre.org/techniques/T1070
Technique ID: T1070.008
Name: Indicator Removal: Clear Mailbox Data
Description: Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or...
Tactics: Defense Evasion
Platforms Affected: Google Workspace, Linux, Office 365, Windows, macOS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1070/008
Technique ID: T1578
Name: Modify Cloud Compute Infrastructure
Description: An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions g...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: Establish centralized logging for the activity of cloud compute infrastructure components. Monitor for suspicious sequences of events, such as the creation of multiple snapshots within a short period of time or the mount of a snapshot to a new instance by a new or unexpected user. To reduce false ...
More Information: https://attack.mitre.org/techniques/T1578
Technique ID: T1578.002
Name: Modify Cloud Compute Infrastructure: Create Cloud Instance
Description: An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may Create Snaps...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: The creation of a new instance or VM is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, the creation of an instance by a new user account or the unexpecte...
More Information: https://attack.mitre.org/techniques/T1578/002
Technique ID: T1578.001
Name: Modify Cloud Compute Infrastructure: Create Snapshot
Description: An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass ...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: The creation of a snapshot is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities such as the creation of one or more snapshots and the restoration of these snapshots by a ...
More Information: https://attack.mitre.org/techniques/T1578/001
Technique ID: T1578.003
Name: Modify Cloud Compute Infrastructure: Delete Cloud Instance
Description: An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not rec...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: The deletion of a new instance or virtual machine is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, detecting a sequence of events such as the creation o...
More Information: https://attack.mitre.org/techniques/T1578/003
Technique ID: T1578.005
Name: Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations
Description: Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Su...
Tactics: Defense Evasion
Platforms Affected: IaaS
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1578/005
Technique ID: T1578.004
Name: Modify Cloud Compute Infrastructure: Revert Cloud Instance
Description: An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or ...