T1685 - Disable or Modify Tools
Tattiche:
Defense Impairment
Defense Impairment
Piattaforme:
Containers ESXi IaaS Linux +3
Containers ESXi IaaS Linux +3
Rilevamento:
Not specified
Not specified
Description:
Adversaries may disable, degrade, or tamper with security tools or applications (e.g., endpoint detection and response (EDR) tools, intrusion detection systems (IDS), antivirus, logging agents, sensors, etc.) to impair or reduce visibility of defensive capabilities. This may include stopping specific services, killing processes, modifying or deleting tool configuration files and Registry keys, or preventing tools from updating. This may also include impairing defenses more broadly by disrupting preventative, detection, and response mechanisms across host, network, and cloud environments.(Citation: SCADAfence_ransomware)
In addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)
More advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization’s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)
In addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)
More advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization’s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)
Usato da Attori (20)
Turla
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
FIN6
Unknown
Unknown
Gamaredon Group
Unknown
Unknown
APT5
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
INDRIK SPIDER
Unknown
Unknown
TA505
Unknown
Unknown
WIZARD SPIDER
Nation-state
Nation-state
Rocke
Unknown
Unknown
APT41
Nation-state
Nation-state
TeamTNT
Unknown
Unknown
TA2541
Unknown
Unknown
Scattered Spider
Unknown
Unknown
UNC3886
Unknown
Unknown
MirrorFace
Unknown
Unknown
Medusa Group
Unknown
Unknown
Velvet Ant
Unknown
Unknown
Aquatic Panda
Unknown
Unknown
Malware (20)
HDoor other
TrickBot other
EKANS other
JumbledPath other
Stuxnet other
RobbinHood other
StrongPity other
Brave Prince other
Medusa Ransomware other
macOS.OSAMiner other
SslMM other
BOLDMOVE other
Woody RAT other
ShrinkLocker other
Hildegard other
WhisperGate other
Skidmap other
Raspberry Robin other
Diavol other
DarkComet other
Metadata
| MITRE ID: | T1685 |
| STIX ID: | attack-pattern--bbde9781-60aa-... |
| Piattaforme: | Containers, ESXi, IaaS, Linux, macOS, Network Devices, Windows |
| Created: | 28/04/2026 16:00 |
| Updated: | 01/05/2026 16:00 |