T1562.004 - Disable or Modify System Firewall
Sub-technique
Tattiche:
Defense Evasion
Defense Evasion
Piattaforme:
ESXi Linux macOS Network Devices +1
ESXi Linux macOS Network Devices +1
Rilevamento:
Not specified
Not specified
Description:
Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.
Modifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. [Non-Standard Port](https://attack.mitre.org/techniques/T1571)).(Citation: change_rdp_port_conti)
Adversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds.(Citation: Huntress BlackCat) Settings related to enabling abuse of various [Remote Services](https://attack.mitre.org/techniques/T1021) may also indirectly modify firewall rules.
In ESXi, firewall rules may be modified directly via the esxcli command line interface (e.g., via `esxcli network firewall set`) or via the vCenter user interface.(Citation: Trellix Rnasomhouse 2024)(Citation: Broadcom ESXi Firewall)
Modifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. [Non-Standard Port](https://attack.mitre.org/techniques/T1571)).(Citation: change_rdp_port_conti)
Adversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds.(Citation: Huntress BlackCat) Settings related to enabling abuse of various [Remote Services](https://attack.mitre.org/techniques/T1021) may also indirectly modify firewall rules.
In ESXi, firewall rules may be modified directly via the esxcli command line interface (e.g., via `esxcli network firewall set`) or via the vCenter user interface.(Citation: Trellix Rnasomhouse 2024)(Citation: Broadcom ESXi Firewall)
Usato da Attori (17)
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
Kimsuky
Nation-state
Nation-state
Rocke
Unknown
Unknown
TeamTNT
Unknown
Unknown
ToddyCat
Unknown
Unknown
UNC3886
Unknown
Unknown
Medusa Group
Unknown
Unknown
Velvet Ant
Unknown
Unknown
Dragonfly
Unknown
Unknown
Magic Hound
Unknown
Unknown
APT38
Unknown
Unknown
Moses Staff
Unknown
Unknown
BlackByte
Unknown
Unknown
Salt Typhoon
Unknown
Unknown
Carbanak
Unknown
Unknown
Malware (20)
Kasidet other
Hannotog other
PyDCrypt other
THINCRUST other
ShrinkLocker other
BlackByte 2.0 Ransomware other
HOPLIGHT other
InvisiMole other
DarkComet other
PlugX other
Remsec other
TYPEFRAME other
BPFDoor other
Grandoreiro other
BADCALL other
Cyclops Blink other
NanoCore other
HARDRAIN other
ZxShell other
njRAT other
Metadata
| MITRE ID: | T1562.004 |
| STIX ID: | attack-pattern--5372c5fe-f424-... |
| Piattaforme: | ESXi, Linux, macOS, Network Devices, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |