Common Information
Type | Value |
---|---|
Value |
Disabling Security Tools - T1089 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may disable security tools to avoid possible detection of their tools and activities. This can take the form of killing security software or event logging processes, deleting Registry keys so that tools do not start at run time, or other methods to interfere with security scanning or event reporting. Detection: Monitor processes and command-line arguments to see if security tools are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Lack of log or event file reporting may be suspicious. Platforms: Linux, macOS, Windows Data Sources: API monitoring, Anti-virus, File monitoring, Services, Windows Registry, Process command-line parameters Defense Bypassed: Anti-virus, File monitoring, Host intrusion prevention systems, Signature-based detection, Log analysis |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-03-11 | 12 | 5 Common Evasion Techniques in Malware - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2025-03-10 | 57 | Threat Intelligence Report Mar 4th – Mar 10th, 2025 | ||
Details | Website | 2025-03-03 | 31 | Resecurity | DragonForce Ransomware - Reverse Engineering Report | ||
Details | Website | 2025-02-24 | 172 | Black Basta Playbook Chat Leak | ||
Details | Website | 2025-02-18 | 38 | RansomHub: Analyzing the TTPs of One of the Most Notorious Ransomware Variants of 2024 | ||
Details | Website | 2025-02-17 | 21 | Threat Intelligence Report February 11 - February 17 2025 | Red Piranha | ||
Details | Website | 2025-02-10 | 29 | Threat Intelligence Report Feb 4th – Feb 10th, 2025 | ||
Details | Website | 2025-02-07 | 2 | Outpacing Ransomware: Proactive Prevention Strategies | ||
Details | Website | 2025-02-06 | 8 | Lazarus Group Targets Bitdefender Researcher with LinkedIn Job Scam | ||
Details | Website | 2025-02-04 | 10 | Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam | ||
Details | Website | 2025-01-20 | 4 | Pumakit - Sophisticated Linux Rootkit That Persist Even After Reboots | ||
Details | Website | 2025-01-16 | 13 | Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2025-01-08 | 0 | How to Defend Against the Three Most Dangerous Cybersecurity Attacks | ||
Details | Website | 2025-01-06 | 25 | Threat Intelligence Report December 31 2024 - January 6 2025 | Red Piranha | ||
Details | Website | 2024-12-30 | 25 | Threat Intelligence Report December 24th – December 30th, 2024 | ||
Details | Website | 2024-12-03 | 17 | Mastering Advanced Evasion Techniques: An In-Depth Guide to Understanding and Mitigating… | ||
Details | Website | 2024-10-18 | 56 | Vietnamese Threat Actor’s Multi-Layered Strategy On Digital Marketing Professionals - Cyble | ||
Details | Website | 2024-09-12 | 0 | New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks | ||
Details | Website | 2024-09-10 | 56 | Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries | ||
Details | Website | 2024-09-02 | 0 | Understanding the Crown Jewels of an Organization: Safeguarding What Matters Most ……! | ||
Details | Website | 2024-09-01 | 2 | SCENARIO: Exploitation of ScreenConnect Authentication Bypass Vulnerability (CVE-2024–1709 &… | ||
Details | Website | 2024-08-30 | 6 | Critical Advisory On RansomHub Ransomware - Cyble | ||
Details | Website | 2024-08-12 | 3 | BlackCat Ransomware | ||
Details | Website | 2024-07-15 | 54 | Security's Achilles' Heel: Vulnerable Drivers on the Prowl | ||
Details | Website | 2023-06-29 | 12 | Malware Analysis - medusalocker - f6f120d1262b88f79debb5d848ac7db9 - RedPacket Security |