Skip to content

Configuration Tampering

Configuration tampering is a sophisticated sub-technique used during the Deepening Control phase to disable or weaken runtime protection services without having to terminate processes or uninstall security software. Attackers modify configuration files, registry settings, or command-line parameters that govern the behavior of security tools, effectively neutralizing their protective capabilities while keeping them running to avoid detection. This approach is particularly insidious because the protection services continue to operate in a compromised state, reporting normal operation while their actual defensive mechanisms have been disabled or bypassed. Attackers might alter detection thresholds, disable specific protection modules, redirect logging functions, or modify monitoring rules in critical security configurations. By manipulating these settings rather than stopping services outright, adversaries can maintain a lower profile while achieving the same objective of evading security controls, as many detection systems look for service termination but not configuration changes.

Mitigations

ID Mitigation Description
M1022 Restrict File and Directory Permissions Make security‐agent config files read-only for non-privileged users and protect them with immutable attributes or cloud-policy enforcement.
M1036 Account Use Policies Require change-management workflow and code-review for any modification to production security configurations.

Detection

ID Data Source Detection
DS0022 File: File Creation & Modification Alert on changes to configuration files, or policy objects outside maintenance periods.
DS0015 Application Log Parse agent logs for "configuration reload" or checksum-mismatch messages and correlate with user identity & source host.