Trust Modification (T1484.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Defense Evasion
  • Privilege Escalation

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Ben Fletcher and Steve de Vera. (2024, June). New tactics and techniques for proactive threat detection. Retrieved September 25, 2024. AWS RE:Inforce Threat Detection 2024
CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021. CISA SolarWinds Cloud Detection
Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022. AADInternals zure AD Federated Domain
Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020. Microsoft - Azure AD Federation
Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020. Microsoft - Azure Sentinel ADFSDomainTrustMods
Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020. Microsoft - Update or Repair Federated domain
Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024. Okta Cross-Tenant Impersonation 2023
Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021. Sygnia Golden SAML