T1562.004 Disable or Modify System Firewall

Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.

Modifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. Non-Standard Port).(Citation: change_rdp_port_conti)

Adversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds.(Citation: Huntress BlackCat) Settings related to enabling abuse of various Remote Services may also indirectly modify firewall rules.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.AA-01.01 Identity and credential management Mitigates T1562.004 Disable or Modify System Firewall
Comments
This diagnostic statement protects against Disable or Modify System Firewall through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
References

    NIST 800-53 Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    CA-07 Continuous Monitoring mitigates T1562.004 Disable or Modify System Firewall
    CM-06 Configuration Settings mitigates T1562.004 Disable or Modify System Firewall
    CM-05 Access Restrictions for Change mitigates T1562.004 Disable or Modify System Firewall
    SI-03 Malicious Code Protection mitigates T1562.004 Disable or Modify System Firewall
    SI-07 Software, Firmware, and Information Integrity mitigates T1562.004 Disable or Modify System Firewall
    CM-02 Baseline Configuration mitigates T1562.004 Disable or Modify System Firewall
    IA-02 Identification and Authentication (Organizational Users) mitigates T1562.004 Disable or Modify System Firewall
    CM-07 Least Functionality mitigates T1562.004 Disable or Modify System Firewall
    SI-04 System Monitoring mitigates T1562.004 Disable or Modify System Firewall
    AC-02 Account Management mitigates T1562.004 Disable or Modify System Firewall
    AC-03 Access Enforcement mitigates T1562.004 Disable or Modify System Firewall
    AC-05 Separation of Duties mitigates T1562.004 Disable or Modify System Firewall
    AC-06 Least Privilege mitigates T1562.004 Disable or Modify System Firewall

    VERIS Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    action.hacking.variety.Disable controls Disable or interfere with security controls related-to T1562.004 Disable or Modify System Firewall
    action.malware.variety.Disable controls Disable or interfere with security controls related-to T1562.004 Disable or Modify System Firewall

    Azure Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1562.004 Disable or Modify System Firewall
    Comments
    There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
    References
    alerts_for_linux_machines Alerts for Linux Machines technique_scores T1562.004 Disable or Modify System Firewall
    Comments
    This control may alert on manipulation of the on-host firewall. Firewall rules should not be changed often in a standard environment and such an event can provide a high fidelity alert.
    References
    alerts_for_windows_machines Alerts for Windows Machines technique_scores T1562.004 Disable or Modify System Firewall
    Comments
    This control may detect modification of the Windows firewall through use of netsh.exe or using a method that matches a known threat actor. The following alerts may be generated: "Malicious firewall rule created by ZINC server implant [seen multiple times]", "Detected suspicious new firewall rule".
    References

    GCP Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    google_secops Google Security Operations technique_scores T1562.004 Disable or Modify System Firewall
    Comments
    Google Security Ops is able to trigger an alert based on processes, such as VPC Network Firewall rule changes. This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/gcp_cloudaudit/gcp_firewall_rule_changes.yaral
    References

    AWS Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    amazon_inspector Amazon Inspector technique_scores T1562.004 Disable or Modify System Firewall
    Comments
    The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Due to this and the fact the security control is only supported for Linux platforms, the score is Minimal.
    References