<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1562 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1562/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1562/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Service Stop and Disable Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</link><pubDate>Tue, 09 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-linux-service-disable/</guid><description>Attackers may halt or disable security services on Linux systems to evade defenses, maintain persistence, or disrupt operations, detected through the use of utilities like 'systemctl', 'service', and 'chkconfig'.</description><content:encoded><![CDATA[<p>Attackers may attempt to stop or disable services on a compromised Linux system to impair security tools, disrupt operations, or facilitate further malicious activities. This can involve disabling security software, logging mechanisms, or other critical services that could hinder the attacker&rsquo;s objectives. This activity often forms part of a broader attack campaign aimed at maintaining persistence, evading detection, or causing system-wide disruption. The commands <code>systemctl</code>, <code>service</code>, and…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-evasion</category><category>attack.t1562</category><category>attack.impact</category><category>attack.t1489</category></item></channel></rss>