Skip to content
Threat Feed

Tag

Attack.defense-Impairment

14 briefs RSS
medium advisory

Bitbucket Secret Scanning Rule Deleted

Attackers may delete secret scanning rules in Bitbucket to impair defenses and introduce secrets into the code repository undetected, potentially leading to unauthorized access or data breaches.

Bitbucket attack.defense-impairment attack.t1685
2r 1t
low advisory

New AWS Network ACL Entry Creation Detected

Detection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.

AWS CloudTrail +1 attack.defense-impairment attack.t1686.001 cloud
2r 1t
medium advisory

Bitbucket Audit Log Configuration Modified

An attacker may modify the Bitbucket audit log configuration to impair security monitoring and evade detection.

Bitbucket attack.defense-impairment attack.t1562.004
2r 1t
high advisory

GitHub Secret Scanning Feature Disabled

Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.

Github attack.defense-impairment attack.t1685
2r 1t
medium advisory

Unauthorized Modification of Azure Conditional Access Policy

An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.

Azure Active Directory azure conditional-access policy-modification attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 +1
2r 2t
medium advisory

Azure AD Root Certificate Authority Added for Passwordless Authentication

An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.

Azure Active Directory attack.credential-access attack.persistence attack.privilege-escalation attack.defense-impairment attack.t1556
2r 4t
high advisory

GitHub Push Protection Disabled

An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.

GitHub Enterprise Cloud attack.defense-impairment attack.t1685
2r 1t
medium advisory

Bitbucket Global Secret Scanning Rule Deletion

An adversary with administrative privileges may delete global secret scanning rules in Bitbucket to impair defenses and exfiltrate sensitive data without detection.

Bitbucket attack.defense-impairment attack.t1685
2r 1t
medium advisory

Bitbucket Repository Exempted from Secret Scanning

An attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.

Bitbucket Server attack.defense-impairment attack.t1685 bitbucket
2r 1t
low advisory

Bitbucket Project Secret Scanning Allowlist Added

An adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.

Bitbucket attack.defense-impairment attack.t1685
2r
medium advisory

User Added to Group with Conditional Access Policy Modification Access

An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.

Azure Active Directory attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 attack.t1556
3r 4t
medium advisory

Azure Network Firewall Policy Modification or Deletion

An adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.

Azure Network Firewall attack.impact attack.defense-impairment attack.t1686.001
3r
medium advisory

Azure AD Hybrid Health AD FS Service Deletion for Defense Evasion

Threat actors may delete Azure AD Hybrid Health AD FS service instances after using them to spoof AD FS signing logs for defense evasion.

Azure Active Directory attack.defense-impairment attack.t1578.003 azure
2r 1t
medium advisory

AWS Config Service Disabling Detection

Detection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.

AWS Config +1 attack.defense-impairment attack.t1562.008 aws
2r 1t