T1562.006 Indicator Blocking

An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting(Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW)(Citation: Microsoft About Event Tracing 2018), by tampering settings that control the collection and flow of event telemetry.(Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as PowerShell or Windows Management Instrumentation.

For example, adversaries may modify the File value in <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security</code> to hide their malicious actions in a new or different .evtx log file. This action does not require a system reboot and takes effect immediately.(Citation: disable_win_evt_logging)

ETW interruption can be achieved multiple ways, however most directly by defining conditions using the PowerShell <code>Set-EtwTraceProvider</code> cmdlet or by interfacing directly with the Registry to make alterations.

In the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products.

In Linux environments, adversaries may disable or reconfigure log processing tools such as syslog or nxlog to inhibit detection and monitoring capabilities to facilitate follow on behaviors (Citation: LemonDuck).

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.01 Configuration baselines Mitigates T1562.006 Indicator Blocking
Comments
This diagnostic statement provides for securely configuring production systems. This includes hardening default configurations and making security-focused setting adjustments to reduce the attack surface, enforce best practices, and protect sensitive data thereby mitigating adversary exploitation.
References
    PR.PS-01.02 Least functionality Mitigates T1562.006 Indicator Blocking
    Comments
    This diagnostic statement provides for limiting unnecessary software, services, ports, protocols, etc. Ensuring systems only have installed and enabled what is essential for their operation reduces the attack surface and minimizes vulnerabilities, which mitigates a wide range of techniques.
    References
      PR.PS-01.03 Configuration deviation Mitigates T1562.006 Indicator Blocking
      Comments
      This diagnostic statement provides protection from Impair Defenses: Indicator Blocking through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baselining and integrity checking can help protect against adversaries attempting to compromise and modify software and its configurations.
      References
        PR.AA-01.01 Identity and credential management Mitigates T1562.006 Indicator Blocking
        Comments
        This diagnostic statement protects against Indicator Blocking through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
        References

          NIST 800-53 Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          CA-07 Continuous Monitoring mitigates T1562.006 Indicator Blocking
          CM-06 Configuration Settings mitigates T1562.006 Indicator Blocking
          CM-05 Access Restrictions for Change mitigates T1562.006 Indicator Blocking
          IA-09 Service Identification and Authentication mitigates T1562.006 Indicator Blocking
          CM-10 Software Usage Restrictions mitigates T1562.006 Indicator Blocking
          SC-23 Session Authenticity mitigates T1562.006 Indicator Blocking
          SC-08 Transmission Confidentiality and Integrity mitigates T1562.006 Indicator Blocking
          SI-03 Malicious Code Protection mitigates T1562.006 Indicator Blocking
          SI-07 Software, Firmware, and Information Integrity mitigates T1562.006 Indicator Blocking
          CM-02 Baseline Configuration mitigates T1562.006 Indicator Blocking
          IA-02 Identification and Authentication (Organizational Users) mitigates T1562.006 Indicator Blocking
          CM-07 Least Functionality mitigates T1562.006 Indicator Blocking
          SI-04 System Monitoring mitigates T1562.006 Indicator Blocking
          AC-02 Account Management mitigates T1562.006 Indicator Blocking
          AC-03 Access Enforcement mitigates T1562.006 Indicator Blocking
          AC-05 Separation of Duties mitigates T1562.006 Indicator Blocking
          AC-06 Least Privilege mitigates T1562.006 Indicator Blocking

          VERIS Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          action.malware.variety.Disable controls Disable or interfere with security controls related-to T1562.006 Indicator Blocking

          Azure Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          microsoft_sentinel Microsoft Sentinel technique_scores T1562.006 Indicator Blocking
          Comments
          The Microsoft Sentinel Hunting "Microsoft Sentinel Analytics Rules Administrative Operations" query can identify potential attempts to impair defenses by changing or deleting detection analytics. The Microsoft Sentinel Analytics "Azure DevOps - Retention Reduced to Zero" query can identify that an adversary is looking to reduce their malicious activity's footprint by preventing retention of artifacts. Control is specific to indicators produced by Azure DevOps. The coverage for these queries is minimal resulting in an overall Minimal score.
          References
          file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1562.006 Indicator Blocking
          Comments
          There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
          References
          alerts_for_linux_machines Alerts for Linux Machines technique_scores T1562.006 Indicator Blocking
          Comments
          This control may alert on activity which disables auditd logging on Linux endpoints. The auditd package may not be the only logging system being utilized and this control may not alert on activity that disables other logging software.
          References

          AWS Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          amazon_guardduty Amazon GuardDuty technique_scores T1562.006 Indicator Blocking
          Comments
          The following GuardDuty findings provide indicators of malicious activity in defense measures: Stealth:IAMUser/CloudTrailLoggingDisabled Stealth:IAMUser/PasswordPolicyChange Stealth:S3/ServerAccessLoggingDisabled Impact:S3/MaliciousIPCaller Exfiltration:S3/MaliciousIPCaller Exfiltration:S3/ObjectRead.Unusual PenTest:S3/KaliLinux PenTest:S3/ParrotLinux PenTest:S3/PentooLinux UnauthorizedAccess:S3/MaliciousIPCaller.Custom UnauthorizedAccess:S3/TorIPCaller
          References
          amazon_inspector Amazon Inspector technique_scores T1562.006 Indicator Blocking
          Comments
          The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Due to this and the fact the security control is only supported for Linux platforms, the score is Minimal.
          References