text stringlengths 0 3.15k |
|---|
Description: Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in Disable or Modify System Firewall. Cloud environments typically utilize restrictive security groups and f... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: Monitor cloud logs for modification or creation of new security groups or firewall rules. |
More Information: https://attack.mitre.org/techniques/T1562/007 |
Technique ID: T1562.008 |
Name: Impair Defenses: Disable or Modify Cloud Logs |
Description: An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environ... |
Tactics: Defense Evasion |
Platforms Affected: Azure AD, Google Workspace, IaaS, Office 365, SaaS |
Detection Strategies: Monitor logs for API calls to disable logging. In AWS, monitor for: StopLogging and DeleteTrail. In GCP, monitor for: google.logging.v2.ConfigServiceV2.UpdateSink. In Azure, monitor for az monitor diagnostic-settings delete. Additionally, a sudden loss of a log source may indicate that it has been... |
More Information: https://attack.mitre.org/techniques/T1562/008 |
Technique ID: T1562.001 |
Name: Impair Defenses: Disable or Modify Tools |
Description: Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or othe... |
Tactics: Defense Evasion |
Platforms Affected: Containers, IaaS, Linux, Network, Windows, macOS |
Detection Strategies: Monitor processes and command-line arguments to see if security tools/services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Monitoring for changes to other known features used by deployed security tools may... |
More Information: https://attack.mitre.org/techniques/T1562/001 |
Technique ID: T1656 |
Name: Impersonation |
Description: Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via Phishing for Information, Phishing, or Internal Spearphishing) while impersonating a known sender such... |
Tactics: Defense Evasion |
Platforms Affected: Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1656 |
Technique ID: T1070 |
Name: Indicator Removal |
Description: Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to ... |
Tactics: Defense Evasion |
Platforms Affected: Containers, Google Workspace, Linux, Network, Office 365, Windows, macOS |
Detection Strategies: File system monitoring may be used to detect improper deletion or modification of indicator files. Events not stored on the file system may require different detection mechanisms. |
More Information: https://attack.mitre.org/techniques/T1070 |
Technique ID: T1070.008 |
Name: Indicator Removal: Clear Mailbox Data |
Description: Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or... |
Tactics: Defense Evasion |
Platforms Affected: Google Workspace, Linux, Office 365, Windows, macOS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1070/008 |
Technique ID: T1578 |
Name: Modify Cloud Compute Infrastructure |
Description: An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions g... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: Establish centralized logging for the activity of cloud compute infrastructure components. Monitor for suspicious sequences of events, such as the creation of multiple snapshots within a short period of time or the mount of a snapshot to a new instance by a new or unexpected user. To reduce false ... |
More Information: https://attack.mitre.org/techniques/T1578 |
Technique ID: T1578.002 |
Name: Modify Cloud Compute Infrastructure: Create Cloud Instance |
Description: An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may Create Snaps... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: The creation of a new instance or VM is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, the creation of an instance by a new user account or the unexpecte... |
More Information: https://attack.mitre.org/techniques/T1578/002 |
Technique ID: T1578.001 |
Name: Modify Cloud Compute Infrastructure: Create Snapshot |
Description: An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass ... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: The creation of a snapshot is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities such as the creation of one or more snapshots and the restoration of these snapshots by a ... |
More Information: https://attack.mitre.org/techniques/T1578/001 |
Technique ID: T1578.003 |
Name: Modify Cloud Compute Infrastructure: Delete Cloud Instance |
Description: An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not rec... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: The deletion of a new instance or virtual machine is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, detecting a sequence of events such as the creation o... |
More Information: https://attack.mitre.org/techniques/T1578/003 |
Technique ID: T1578.005 |
Name: Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations |
Description: Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Su... |
Tactics: Defense Evasion |
Platforms Affected: IaaS |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1578/005 |
Technique ID: T1578.004 |
Name: Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Description: An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.