T1562.006 Indicator Blocking Mappings

An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting(Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW)(Citation: Microsoft About Event Tracing 2018), by tampering settings that control the collection and flow of event telemetry.(Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as PowerShell or Windows Management Instrumentation.

For example, adversaries may modify the File value in <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security</code> to hide their malicious actions in a new or different .evtx log file. This action does not require a system reboot and takes effect immediately.(Citation: disable_win_evt_logging)

ETW interruption can be achieved multiple ways, however most directly by defining conditions using the PowerShell <code>Set-EtwTraceProvider</code> cmdlet or by interfacing directly with the Registry to make alterations.

In the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products.

In Linux environments, adversaries may disable or reconfigure log processing tools such as syslog or nxlog to inhibit detection and monitoring capabilities to facilitate follow on behaviors (Citation: LemonDuck).

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-02 Account Management Protects T1562.006 Indicator Blocking
AC-03 Access Enforcement Protects T1562.006 Indicator Blocking
AC-05 Separation of Duties Protects T1562.006 Indicator Blocking
AC-06 Least Privilege Protects T1562.006 Indicator Blocking
CA-07 Continuous Monitoring Protects T1562.006 Indicator Blocking
CM-10 Software Usage Restrictions Protects T1562.006 Indicator Blocking
CM-02 Baseline Configuration Protects T1562.006 Indicator Blocking
CM-05 Access Restrictions for Change Protects T1562.006 Indicator Blocking
CM-06 Configuration Settings Protects T1562.006 Indicator Blocking
CM-07 Least Functionality Protects T1562.006 Indicator Blocking
IA-02 Identification and Authentication (organizational Users) Protects T1562.006 Indicator Blocking
IA-09 Service Identification and Authentication Protects T1562.006 Indicator Blocking
SC-23 Session Authenticity Protects T1562.006 Indicator Blocking
SC-08 Transmission Confidentiality and Integrity Protects T1562.006 Indicator Blocking
SI-03 Malicious Code Protection Protects T1562.006 Indicator Blocking
SI-04 System Monitoring Protects T1562.006 Indicator Blocking
SI-07 Software, Firmware, and Information Integrity Protects T1562.006 Indicator Blocking