Skip to content

Exploitation for Defense Evasion

Info

ID: AT-DC003
Tactic: Deepening Control
Sub-techniques: Hijacking, Injection, Proc Memory, Ptrace System Calls, Reflective Code Loading, Shared Library, Thread Execution
Platforms: Linux, macOS, Windows, IaaS
Defense Bypassed: Anti-virus, Application Control, System Monitoring

Exploitation for Defense Evasion

Adversaries may exploit how the target operating system or runtime environment monitors processes, memory, and filesystem operations to remain undetected. Techniques include injecting code into legitimate processes, using ptrace system calls to alter runtime behavior, or abusing reflective loading to hide malicious modules. This avoids simple signature-based detection and complicates incident response by blending with normal system functions.

Cloud and container platforms often incorporate monitoring agents and logs for security visibility, but adversaries who exploit these to bypass or disable checks can achieve prolonged stealth. Successfully evading defenses grants attackers more time to pivot through the environment, exfiltrate data, or embed deeper persistence. This method typically appears alongside other advanced tactics, since an unnoticed intrusion is essential for broad compromise.

Detection

ID Data Source Detection
DS0015 Application Log Raise an alert when security products (AV / EDR / WAF) report a crash, self-protection fault, or watchdog reset within seconds of exploit traffic or privilege-escalation activity—classic symptoms of an adversary disabling or patching the control.
DS0009 Process: Process Access Detect memory manipulation or injection for fileless execution occurring between an untrusted process and a higher-privilege target
DS0009 Process: OS API Execution Alert when a process executing system calls used associated with defense evasion, for example, ptrace(PTRACE_ATTACH) or process_vm_writev, or performs mprotect(PROT_EXEC) on pages it modified.
DS0009 Process: Process Creation Raise when a process is started with CLONE_UNTRACED/CLONE_PTRACE flags or equivalent, indicating deliberate debugger-evasion or remote-thread execution.
DS0022 File: File Creation Detect newly-created file or library that reuse trusted filenames but whose hash, signature, or compile timestamp diverge from the expected baseline.

Mitigations

ID Mitigation Description
M1040 Behavior Prevention on Endpoint Implement advanced endpoint detection and response capabilities
M1050 Exploit Protection Implement exploit protection mechanisms and memory protections
M1022 Restrict File and Directory Permissions Implement strict file and directory permissions to prevent tampering