CAPEC-571 Block Logging to Central Repository

CAPEC ID: 571

CAPEC-571 Metadata

Likelihood of Attack

Medium

Typical Severity

Low

Overview

Summary

An adversary prevents host-generated logs being delivered to a central location in an attempt to hide indicators of compromise.

Prerequisites

No prerequisites listed.

Potential Solutions / Mitigations

No specific solutions listed.

Related CAPECs

CAPEC ID Description
CAPEC-161 An attacker exploits characteristics of the infrastructure of a network entity in order to perpetrate attacks or information gathering on network objects or effect a change in the ordinary information flow between network objects. Most often, this involves manipulation of the routing of network messages so, instead of arriving at their proper destination, they are directed towards an entity of the attackers' choosing, usually a server controlled by the attacker. The victim is often unaware that their messages are not being processed correctly. For example, a targeted client may believe they are connecting to their own bank but, in fact, be connecting to a Pharming site controlled by the attacker which then collects the user's login information in order to hijack the actual bank account.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1562.002 Impair Defenses: Impair Command History Logging
1562.006 Impair Defenses: Indicator Blocking
1562.008 Impair Defenses: Disable Cloud Logs

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.