Difference between revisions of "Evasion"
|Line 2:||Line 2:|
|Summary=The adversary is trying to avoid being detected.
|Summary=The adversary is trying to avoid being detected.
|Description= Evasion consists of techniques that adversaries use to avoid detection by both human and technical defenses throughout their compromise. Techniques used for evasion include uninstalling/disabling security software
|Description= Evasion consists of techniques that adversaries use to avoid detection by both human and technical defenses throughout their compromise. Techniques used for evasion include uninstalling/disabling security software blocking and modifying communications and reporting. Adversaries also leverage and abuse trusted processes to hide and masquerade . Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Revision as of 10:09, 17 October 2019
The adversary is trying to avoid being detected.
Evasion consists of techniques that adversaries use to avoid detection by both human operator and technical defenses throughout their compromise. Techniques used for evasion include uninstalling/disabling security software and blocking and modifying communications and reporting. Adversaries also leverage and abuse trusted devices and processes to hide and masquerade as master controllers and native software. The particular techniques used may depend on whether the target of evasion is human or technological. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting operators and defenses.
Techniques in this Tactics Category
Below is a list of all the Evasion techniques in ATT&CK for ICS:
|Change Operating Mode||Execution|
|Adversaries may change the operating mode of a controller to gain additional access to engineering functions such as Program Download.
Programmable controllers typically have several modes of operation that control the state of the user program and control access to the controller’s API. Operating modes can be physically selected using a key switch on the face of the controller but may also be selected with calls to the controller’s API. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below:
|Exploitation for Evasion||Evasion||Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to evade detection. Vulnerabilities may exist in software that can be used to disable or circumvent security features. Adversaries may have prior knowledge through Remote System Information Discovery about security features implemented on control devices. These device security features will likely be targeted directly for exploitation. There are examples of firmware RAM/ROM consistency checks on control devices being targeted by adversaries to enable the installation of malicious System Firmware.|
|Indicator Removal on Host||Evasion||Adversaries may attempt to remove indicators of their presence on a system in an effort to cover their tracks. In cases where an adversary may feel detection is imminent, they may try to overwrite, delete, or cover up changes they have made to the device.|
|Masquerading||Evasion||Adversaries may use masquerading to disguise a malicious application or executable as another file, to avoid operator and engineer suspicion. Possible disguises of these masquerading files can include commonly found programs, expected vendor executables and configuration files, and other commonplace application and naming conventions. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running those masquerading as legitimate functions. Applications and other files commonly found on Windows systems or in engineering workstations have been impersonated before. This can be as simple as renaming a file to effectively disguise it in the ICS environment.|
Inhibit Response Function
|Adversaries may deploy rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting and modifying operating-system API calls that supply system information. Rootkits or rootkit-enabling functionality may reside at the user or kernel level in the operating system, or lower.5 Firmware rootkits that affect the operating system yield nearly full control of the system. While firmware rootkits are normally developed for the main processing board, they can also be developed for I/O that can be attached to the asset. Compromise of this firmware allows the modification of all of the process variables and functions the module engages in. This may result in commands being disregarded and false information being fed to the main device. By tampering with device processes, an adversary may inhibit its expected response functions and possibly enable Impact.|
|Spoof Reporting Message||Evasion|
Impair Process Control
|Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values.
If an adversary has the ability to Spoof Reporting Messages, they can impact the control system in many ways. The adversary can Spoof Reporting Messages that state that the process is operating normally, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors are occurring in order to distract them from the actual source of a problem.6In the Maroochy Attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer.7
- N.A.. (2017, October). What are the different operating modes in PLC?. Retrieved January 28, 2021.
- Omron. (n.d.). PLC Different Operating Modes. Retrieved January 28, 2021.
- Machine Information Systems. (2007). How PLCs Work. Retrieved January 28, 2021.
- PLCgurus. (2021). PLC Basics – Modes Of Operation. Retrieved January 28, 2021.
- Enterprise ATT&CK. (2018, January 11). Rootkit. Retrieved May 16, 2018.
- Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.
- Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.