T1518.001 - Security Software Discovery
Sub-technique
Tattiche:
Discovery
Discovery
Piattaforme:
IaaS Linux macOS Windows
IaaS Linux macOS Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as cloud monitoring agents and anti-virus. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Example commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), <code>reg query</code> with [Reg](https://attack.mitre.org/software/S0075), <code>dir</code> with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software.
Adversaries may also utilize the [Cloud API](https://attack.mitre.org/techniques/T1059/009) to discover cloud-native security software installed on compute infrastructure, such as the AWS CloudWatch agent, Azure VM Agent, and Google Cloud Monitor agent. These agents may collect metrics and logs from the VM, which may be centrally aggregated in a cloud-based monitoring platform.
Example commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), <code>reg query</code> with [Reg](https://attack.mitre.org/software/S0075), <code>dir</code> with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software.
Adversaries may also utilize the [Cloud API](https://attack.mitre.org/techniques/T1059/009) to discover cloud-native security software installed on compute infrastructure, such as the AWS CloudWatch agent, Azure VM Agent, and Google Cloud Monitor agent. These agents may collect metrics and logs from the VM, which may be centrally aggregated in a cloud-based monitoring platform.
Usato da Attori (20)
DarkHotel
Nation-state
Nation-state
Naikon
Nation-state
Nation-state
Turla
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
FIN8
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
WIZARD SPIDER
Nation-state
Nation-state
WindShift
Unknown
Unknown
Rocke
Unknown
Unknown
TeamTNT
Unknown
Unknown
SideCopy
Unknown
Unknown
TA2541
Unknown
Unknown
ToddyCat
Unknown
Unknown
Malteiro
Unknown
Unknown
APT42
Nation-state
Nation-state
Storm-0501
Unknown
Unknown
Medusa Group
Unknown
Unknown
Aquatic Panda
Unknown
Unknown
Play
Unknown
Unknown
Malware (20)
Bumblebee other
Amadey other
Stuxnet other
POWRUNER other
TAMECAT other
Felismus other
Zeus Panda other
StrongPity other
xCaon other
TONESHELL other
Kasidet other
Medusa Ransomware other
Crimson other
DUSTTRAP other
Action RAT other
Avenger other
Prikormka other
PUBLOAD other
Woody RAT other
Mafalda other
Metadata
| MITRE ID: | T1518.001 |
| STIX ID: | attack-pattern--cba37adb-d6fb-... |
| Piattaforme: | IaaS, Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |