Dark Mode
Capec-578 Detail
Disable Security Software
Standard Software Likelihood: Medium Typical Severity: Medium
Parents: 176
Threats: T62 T68 T269 T270 T271 T272 T273 T274 T297 T393
An adversary exploits a weakness in access control to disable security tools so that detection does not occur. This can take the form of killing processes, deleting registry keys so that tools do not start at run time, deleting log files, or other methods.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-578 | capec | https://capec.mitre.org/data/definitions/578.html | |
| CWE-284 | cwe | http://cwe.mitre.org/data/definitions/284.html | |
| T1556.006 | ATTACK | https://attack.mitre.org/wiki/Technique/T1556/006 | Modify Authentication Process: Multi-Factor Authentication |
| T1562.001 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/001 | Impair Defenses: Disable or Modify Tools |
| T1562.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/002 | Impair Defenses: Disable Windows Event Logging |
| T1562.004 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/004 | Impair Defenses: Disable or Modify System Firewall |
| T1562.007 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/007 | Impair Defenses: Disable or Modify Cloud Firewall |
| T1562.008 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/008 | Impair Defenses: Disable Cloud Logs |
| T1562.009 | ATTACK | https://attack.mitre.org/wiki/Technique/T1562/009 | Impair Defenses: Safe Mode Boot |
Not present
- The adversary must have the capability to interact with the configuration of the targeted system.
- None: No specialized resources are required to execute this type of attack.
Not present
| Availability |
|---|
| Hide Activities (By disabling certain security tools, the adversary can hide malicious activity and avoid detection.) |
Not present