Active Setup (T1547.014)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Baumgartner, K., Guerrero-Saade, J. (2015, March 4). Who’s Really Spreading through the Bright Star?. Retrieved December 18, 2020. SECURELIST Bright Star 2015
Glyer, C. (2010). Examples of Recent APT Persistence Mechanism. Retrieved December 18, 2020. Mandiant Glyer APT 2010
Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020. FireEye CFR Watering Hole 2012
Klein, H. (2010, April 22). Active Setup Explained. Retrieved December 18, 2020. Klein Active Setup 2010
Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020. paloalto Tropic Trooper 2016
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns
Scott-Railton, J., et al. (2015, December 8). Packrat. Retrieved December 18, 2020. Citizenlab Packrat 2015