T1211: Exploitation for Defense Evasion

Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.

Adversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for Security Software Discovery. The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.

There have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries , evade security logs , or deploy hidden infrastructure.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

vulnerabilities: PT-CR-2492: CVE_2024_29510_Ghostscript: Possible code execution using the CVE-2024-29510 vulnerability. It is a format string vulnerability in Ghostscript versions before 10.03.1 that allows you to bypass the sandbox and execute arbitrary commands. This vulnerability can be used via libraries such as ImageMagick. vulnerabilities: PT-CR-1377: Foxit_PDF_Reader_RCE: Possible exploitation of vulnerability CVE-2022-28672 in Foxit PDF Reader, which can lead to arbitrary code execution security_code_secret_net_lsp: PT-CR-1894: SecretNet_LSP_Multiple_Host_Unlock: Bulk unlock of network hosts

Detection

IDDS0015Data source and componentApplication Log: Application Log ContentDescription

Exploitation for defense evasion may happen shortly after the system has been compromised to prevent detection during later actions for for additional tools that may be brought in and used. Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash.

IDDS0009Data source and componentProcess: Process CreationDescription

Monitor for abnormal process creations, such as a Command and Scripting Interpreter spawning from a potentially exploited application. Also look for behavior on the system that might indicate successful compromise, such as abnormal behavior of processes.

Mitigation

IDM1051NameUpdate SoftwareDescription

Update software regularly by employing patch management for internal enterprise endpoints and servers.

IDM1050NameExploit ProtectionDescription

Security applications that look for behavior used during exploitation such as Windows Defender Exploit Guard (WDEG) and the Enhanced Mitigation Experience Toolkit (EMET) can be used to mitigate some exploitation behavior. Control flow integrity checking is another way to potentially identify and stop a software exploit from occurring. Many of these protections depend on the architecture and target application binary for compatibility and may not work for software targeted for defense evasion.

IDM1019NameThreat Intelligence ProgramDescription

Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization.

IDM1048NameApplication Isolation and SandboxingDescription

Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation. Risks of additional exploits and weaknesses in these systems may still exist.