Skip to the content.

back

Find sigma rule :x:

Attack: Impair Defenses

Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators.

Adversaries may also impair routine operations that contribute to defensive hygiene, such as blocking users from logging out of a computer or stopping it from being shut down. These restrictions can further enable malicious operations as well as the continued propagation of incidents.(Citation: Emotet shutdown)

Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components.

MITRE

Tactic

technique

Test : Disable journal logging via sed utility

OS

Description:

The atomic test disables the journal logging by searching and replacing the “Storage” parameter to “none” within the journald.conf file, thus any new journal entries will only be temporarily available in memory and not written to disk

Executor

sh

Sigma Rule

back