<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1053.005 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1053.005/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1053.005/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Important Scheduled Task Deletion or Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</guid><description>Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.</description><content:encoded>&lt;p>This brief focuses on the detection of malicious activity related to the deletion or disabling of important scheduled tasks within a Windows environment. Adversaries may target these tasks to disrupt normal system operations, escalate privileges, establish persistence, or facilitate data destruction. The targeted tasks often include critical system functions like System Restore, Windows Defender updates, BitLocker encryption, Windows Backup processes, and Windows Update mechanisms. This…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1053.005</category></item></channel></rss>