ID | Name |
---|---|
T1562.001 | Disable or Modify Tools |
T1562.002 | Disable Windows Event Logging |
T1562.003 | Impair Command History Logging |
T1562.004 | Disable or Modify System Firewall |
T1562.006 | Indicator Blocking |
T1562.007 | Disable or Modify Cloud Firewall |
T1562.008 | Disable Cloud Logs |
T1562.009 | Safe Mode Boot |
T1562.010 | Downgrade Attack |
Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.
Modifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed.
ID | Name | Description |
---|---|---|
G0016 | APT29 |
APT29 used |
G0082 | APT38 |
APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.[2] |
S0031 | BACKSPACE |
The "ZR" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.[3] |
S0245 | BADCALL |
BADCALL disables the Windows firewall before binding to a port.[4] |
G0008 | Carbanak |
Carbanak may use netsh to add local firewall rule exceptions.[5] |
S0492 | CookieMiner |
CookieMiner has checked for the presence of "Little Snitch", macOS network monitoring and application firewall software, stopping and exiting if it is found.[6] |
S0687 | Cyclops Blink |
Cyclops Blink can modify the Linux iptables firewall to enable C2 communication via a stored list of port numbers.[7][8] |
S0334 | DarkComet |
DarkComet can disable Security Center functions like the Windows Firewall.[9][10] |
G0035 | Dragonfly |
Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.[11] |
S0531 | Grandoreiro |
Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level.[12] |
S0132 | H1N1 | |
S0246 | HARDRAIN |
HARDRAIN opens the Windows Firewall to modify incoming connections.[14] |
S0376 | HOPLIGHT | |
S0260 | InvisiMole |
InvisiMole has a command to disable routing and the Firewall on the victim’s machine.[16] |
S0088 | Kasidet |
Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded.[17] |
G0094 | Kimsuky |
Kimsuky has been observed disabling the system firewall.[18] |
G0032 | Lazarus Group |
Various Lazarus Group malware modifies the Windows firewall to allow incoming connections or disable it entirely using netsh. [19][20][21] |
S0336 | NanoCore | |
S0108 | netsh |
netsh can be used to disable local firewall settings.[24][25] |
S0385 | njRAT |
njRAT has modified the Windows firewall to allow itself to communicate through the firewall.[26][27] |
G0116 | Operation Wocao |
Operation Wocao has used PowerShell to add and delete rules in the Windows firewall.[28] |
S0125 | Remsec |
Remsec can add or remove applications or ports on the Windows firewall or disable it entirely.[29] |
G0106 | Rocke |
Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.[30] |
G0139 | TeamTNT | |
S0263 | TYPEFRAME |
TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections.[32] |
S0412 | ZxShell |
ZxShell can disable the firewall by modifying the registry key |
ID | Mitigation | Description |
---|---|---|
M1022 | Restrict File and Directory Permissions |
Ensure proper process and file permissions are in place to prevent adversaries from disabling or modifying firewall settings. |
M1024 | Restrict Registry Permissions |
Ensure proper Registry permissions are in place to prevent adversaries from disabling or modifying firewall settings. |
M1018 | User Account Management |
Ensure proper user permissions are in place to prevent adversaries from disabling or modifying firewall settings. |
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0018 | Firewall | Firewall Disable |
Firewall Rule Modification | ||
DS0024 | Windows Registry | Windows Registry Key Modification |
Monitor processes and command-line arguments to see if firewalls are disabled or modified. Monitor Registry edits to keys that manage firewalls.