<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1489 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1489/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1489/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Service Stop and Disable Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</link><pubDate>Tue, 09 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</guid><description>Attackers may halt or disable security services on Linux systems to evade defenses, maintain persistence, or disrupt operations, detected through the use of utilities like 'systemctl', 'service', and 'chkconfig'.</description><content:encoded><![CDATA[<p>Attackers may attempt to stop or disable services on a compromised Linux system to impair security tools, disrupt operations, or facilitate further malicious activities. This can involve disabling security software, logging mechanisms, or other critical services that could hinder the attacker&rsquo;s objectives. This activity often forms part of a broader attack campaign aimed at maintaining persistence, evading detection, or causing system-wide disruption. The commands <code>systemctl</code>, <code>service</code>, and…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-evasion</category><category>attack.t1562</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>Adversaries Disabling Important Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</guid><description>Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting scheduled tasks to disable critical system functions. This tactic involves using <code>schtasks.exe</code> to disable essential tasks related to security, backup, and update mechanisms. By disabling tasks like Windows Defender scans, System Restore points, BitLocker encryption, and Windows Update, adversaries can significantly weaken a system&rsquo;s defenses, making it more vulnerable to data destruction or ransomware attacks. The observed behavior involves the execution of…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>Deletion of Critical Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</guid><description>Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.</description><content:encoded>&lt;p>Attackers may attempt to delete scheduled tasks to disable security mechanisms or prevent system recovery, creating an environment conducive to data destruction. This involves using the &lt;code>schtasks.exe&lt;/code> utility to remove scheduled tasks related to critical system functions. This activity is designed to impair incident response, prevent restoration of systems, and generally increase the impact of an attack. This is done by removing the scheduled tasks, which prevents the execution of security…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item></channel></rss>