Hypervisor (T1062)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Hypervisor

Associated Tactics

  • Persistence

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
capec
Wikipedia. (2016, May 23). Hypervisor. Retrieved June 11, 2016. Wikipedia Hypervisor
Xen. (n.d.). In Wikipedia. Retrieved November 13, 2014. Wikipedia Xen
Myers, M., and Youndt, S. (2007). An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits. Retrieved November 13, 2014. Myers 2007
virtualization.info. (Interviewer) & Liguori, A. (Interviewee). (2006, August 11). Debunking Blue Pill myth [Interview transcript]. Retrieved November 13, 2014. virtualization.info 2006