<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1490 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1490/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1490/feed.xml" rel="self" type="application/rss+xml"/><item><title>System Restore Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-restore-disable/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-restore-disable/</guid><description>Attackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.</description><content:encoded>&lt;p>Attackers may attempt to disable the Windows System Restore feature to hinder forensic analysis and recovery efforts. This involves modifying specific registry keys related to System Restore configuration and operation, effectively preventing the system from creating or using restore points. The commands are executed via cmd, PowerShell or other scripting engines. Disabling System Restore can allow malware to operate without the risk of easy rollback, potentially increasing the impact of a…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1490</category></item></channel></rss>