Defense Evasion
The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactic techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Techniques
Techniques: 20
ID | Name | Description | |
---|---|---|---|
T1484 | Domain or Tenant Policy Modification |
Adversaries may modify the configuration settings of a domain or identity tenant to evade defenses and/or escalate privileges in centrally managed environments. Such services provide a centralized means of managing identity resources such as devices and accounts, and often include configuration settings that may apply between domains or tenants such as trust relationships, identity syncing, or identity federation. |
|
↳ | T1484.002 | Trust Modification |
Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources. These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. A trust relationship between separate domains or tenants within an environment be modified to facilitate access into domains. One way this can be achieved in AWS is through the creation of an Identity Provider. With access to an AWS identity that has the appropriate permissions, threat actors may create an Identity Provider within an AWS account, which allows the threat actor to utilize an alternative means of authenticating into an environment. Additionally, if an AWS Organization with multiple accounts has an Identity Provider configured by a threat actor using this technique, it is possible for a threat actor to federate into, and gain access to, the AWS Organization member accounts without creating identities for each of the member accounts. |
T1562 | Impair Defenses |
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators. |
|
↳ | T1562.008 | Disable Cloud Logs |
An adversary may disable cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may disable cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Using this technique, threat actors can deactivate or modify AWS CloudTrail prior to conducting unauthorized actions in order to hide their activities and evade defenses. |
↳ | T1562.007 | Disable or Modify Cloud Firewall |
Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in Disable or Modify System Firewall. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may use the ec2:ModifySecurityGroupIngress action to modify VPC Security Groups and Security Group rules to expand their ability to access AWS resources. |
↳ | T1562.A001 | Disable or Modify GuardDuty |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may delete or modify Amazon GuardDuty within an AWS account to evade the continuous security monitoring that GuardDuty provides. Threat actors will perform this technique as a precursor to other actions in the AWS account in order to hide and block defenders from being alerted to their unauthorized activities. |
T1070 | Indicator Removal |
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversarys actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform. |
|
↳ | T1070.A001 | Delete IAM Entities |
A prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. |
T1578 | Modify Cloud Compute Infrastructure |
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. |
|
↳ | T1578.002 | Create Cloud Instance |
An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may
Create Snapshot [MITRE]
of one or more volumes in an account, create a new instance, mount the snapshots, and then apply a less restrictive security policy to collect
Data from Local System [MITRE]
or for
Remote Data Staging [MITRE]
. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can create a new computing instance to hijack resources or evade defenses. Creating a new instance may also allow a threat actor to carry out unauthorized activity within an environment without affecting the execution of current running instances. |
↳ | T1578.001 | Create Snapshot |
An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions that prevent access to existing compute service infrastructure, unlike in
Revert Cloud Instance [MITRE]
where an adversary may revert to a snapshot to evade detection and remove evidence of their presence. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may create an Amazon EBS snapshot of an Amazon EBS volume to create a point-in-time backup of that volume as a way to exfiltrate the snapshot. Threat actors can also create a snapshot of an EC2 instance, use the EC2 instance to perform unauthorized actions, then revert to a snapshot to evade detection and remove evidence of previously performed unauthorized actions on the EC2 instance. |
↳ | T1578.003 | Delete Cloud Instance |
An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can delete a cloud instance after they have performed unauthorized actions on the instance in an attempt to evade detection and remove evidence of their activity. Deleting an instance can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. Additionally, threat actors and insider threats can delete cloud instances within an AWS account, causing destructive impact to the AWS account holder. |
↳ | T1578.005 | Modify Cloud Compute Configurations |
Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victims compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their activities to the victim. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to perform the actions in the AWS CloudTrail Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors can modify settings that directly affect the size and resources available to cloud compute infrastructure in order to evade defenses or increase their ability to consume resources, such as changing the instance type or CPU and memory configuration. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow threat actors to abuse the victims compute resources to achieve their goals. |
T1666 | Modify Cloud Resource Hierarchy |
Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses. |
|
↳ | T1666.A001 | Create or Invite AWS Account |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained access to the Management account within in AWS Organization as well as control of an AWS identity with the permissions to perform the actions in the Management account in the Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may create an account within an AWS organization that will use the payment method registered to the management or payer account. Alternatively, the threat actor can invite a separate AWS account under their control to the AWS Organization. The threat actor will then be able to create resources and workloads within the newly created account that may not be subject to existing detections. By default, Service Control Policies are not assigned to new accounts during the creation of the account within an organization. |
↳ | T1666.A002 | Leave AWS Organization |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained access to the Management account within in AWS Organization as well as control of an AWS identity with the permissions to perform the actions in the Management account in the Event Name(s) section. With access to an AWS identity that has the appropriate permissions, threat actors may make the organizations:LeaveOrganizations API call in an AWS account against the AWS Organization to which it is tied. Once this action is completed, the standalone member account would no longer be subject to the Service Control Policies, guardrails, or restrictions imposed upon it by the AWS Organization management account. This will allow a threat actor to manage and have access to the resources and the data accessible through the AWS account. |
T1535 | Unused/Unsupported Cloud Regions |
Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure. AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS identity with the permissions to create resources in a region not previously utilized by the AWS account holder, or, has the appropriate permissions to enable or opt-in to regions not previously available. This technique identifies when cloud resources are created in unused geographic service regions in order to evade detection. A threat actor may need to enable additional regions to use this technique, or simply use regions that a customer is not already using. |
|
T1078 | Valid Accounts |
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop. Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence. |
|
↳ | T1078.A002 | Account Root User |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS account root user. This technique identifies when a threat actor uses the root user to perform unauthorized actions. When you first create an Amazon Web Services (AWS) account, you begin with an identity that has complete access to the AWS services and resources in the account. This identity is called the AWS account root user. The email address and password that you used to create your AWS account are the credentials you use to sign in as your root user. The account root user has complete access to the AWS services and resources in the account, and if compromised by a threat actor, would give the adversary complete access to the AWS account. |
↳ | T1078.A001 | IAM Users |
AWS Specific ContentA prerequisite for this technique is that a threat actor has already gained control of an AWS IAM user. This technique identifies when a threat actor uses an IAM user to perform unauthorized actions through either long-term credentials or through the AWS Management Console. An IAM user is an entity that you create in your AWS account. The IAM user represents the human user or workload who uses the IAM user to interact with AWS resources. An IAM user consists of a name and credentials. An IAM user with administrator permissions is not the same as the AWS account root user. For more information about the root user, see AWS account root user |