MITRE ATT&CK Technique
Defense Evasion T1562.006
Description

An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting(Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW)(Citation: Microsoft About Event Tracing 2018), by tampering settings that control the collection and flow of event telemetry.(Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as [PowerShell](https://attack.mitre.org/techniques/T1059/001) or [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). For example, adversaries may modify the `File` value in <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security</code> to hide their malicious actions in a new or different .evtx log file. This action does not require a system reboot and takes effect immediately.(Citation: disable_win_evt_logging) ETW interruption can be achieved multiple ways, however most directly by defining conditions using the [PowerShell](https://attack.mitre.org/techniques/T1059/001) <code>Set-EtwTraceProvider</code> cmdlet or by interfacing directly with the Registry to make alterations. In the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products. In Linux environments, adversaries may disable or reconfigure log processing tools such as syslog or nxlog to inhibit detection and monitoring capabilities to facilitate follow on behaviors. (Citation: LemonDuck) ESXi also leverages syslog, which can be reconfigured via commands such as `esxcli system syslog config set` and `esxcli system syslog config reload`.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)(Citation: Broadcom Configuring syslog on ESXi)

Supported Platforms
Windows macOS Linux ESXi
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-03-19T19:09:30.329Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'An adversary may attempt to block indicators or events '
                'typically captured by sensors from being gathered and '
                'analyzed. This could include maliciously '
                'redirecting(Citation: Microsoft Lamin Sept 2017) or even '
                'disabling host-based sensors, such as Event Tracing for '
                'Windows (ETW)(Citation: Microsoft About Event Tracing 2018), '
                'by tampering settings that control the collection and flow of '
                'event telemetry.(Citation: Medium Event Tracing Tampering '
                '2018) These settings may be stored on the system in '
                'configuration files and/or in the Registry as well as being '
                'accessible via administrative utilities such as '
                '[PowerShell](https://attack.mitre.org/techniques/T1059/001) '
                'or [Windows Management '
                'Instrumentation](https://attack.mitre.org/techniques/T1047).\n'
                '\n'
                'For example, adversaries may modify the `File` value in '
                '<code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog\\Security</code> '
                'to hide their malicious actions in a new or different .evtx '
                'log file. This action does not require a system reboot and '
                'takes effect immediately.(Citation: '
                'disable_win_evt_logging) \n'
                '\n'
                'ETW interruption can be achieved multiple ways, however most '
                'directly by defining conditions using the '
                '[PowerShell](https://attack.mitre.org/techniques/T1059/001) '
                '<code>Set-EtwTraceProvider</code> cmdlet or by interfacing '
                'directly with the Registry to make alterations.\n'
                '\n'
                'In the case of network-based reporting of indicators, an '
                'adversary may block traffic associated with reporting to '
                'prevent central analysis. This may be accomplished by many '
                'means, such as stopping a local process responsible for '
                'forwarding telemetry and/or creating a host-based firewall '
                'rule to block traffic to specific hosts responsible for '
                'aggregating events, such as security information and event '
                'management (SIEM) products.\n'
                '\n'
                'In Linux environments, adversaries may disable or reconfigure '
                'log processing tools such as syslog or nxlog to inhibit '
                'detection and monitoring capabilities to facilitate follow on '
                'behaviors. (Citation: LemonDuck) ESXi also leverages syslog, '
                'which can be reconfigured via commands such as `esxcli system '
                'syslog config set` and `esxcli system syslog config '
                'reload`.(Citation: Google Cloud Threat Intelligence ESXi VIBs '
                '2022)(Citation: Broadcom Configuring syslog on ESXi)',
 'external_references': [{'external_id': 'T1562.006',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1562/006'},
                         {'description': 'Alexander Marvi, Jeremy Koppen, '
                                         'Tufail Ahmed, and Jonathan Lepore. '
                                         '(2022, September 29). Bad VIB(E)s '
                                         'Part One: Investigating Novel '
                                         'Malware Persistence Within ESXi '
                                         'Hypervisors. Retrieved March 26, '
                                         '2025.',
                          'source_name': 'Google Cloud Threat Intelligence '
                                         'ESXi VIBs 2022',
                          'url': 'https://cloud.google.com/blog/topics/threat-intelligence/esxi-hypervisors-malware-persistence'},
                         {'description': 'Broadcom. (n.d.). Configuring syslog '
                                         'on ESXi. Retrieved March 27, 2025.',
                          'source_name': 'Broadcom Configuring syslog on ESXi',
                          'url': 'https://knowledge.broadcom.com/external/article/318939/configuring-syslog-on-esxi.html'},
                         {'description': 'Heiligenstein, L. (n.d.). REP-25: '
                                         'Disable Windows Event Logging. '
                                         'Retrieved April 7, 2022.',
                          'source_name': 'disable_win_evt_logging',
                          'url': 'https://ptylu.github.io/content/report/report.html?report=25'},
                         {'description': 'Manoj Ahuje. (2022, April 21). '
                                         'LemonDuck Targets Docker for '
                                         'Cryptomining Operations. Retrieved '
                                         'June 30, 2022.',
                          'source_name': 'LemonDuck',
                          'url': 'https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/'},
                         {'description': 'Microsoft. (2009, May 17). '
                                         'Backdoor:Win32/Lamin.A. Retrieved '
                                         'September 6, 2018.',
                          'source_name': 'Microsoft Lamin Sept 2017',
                          'url': 'https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A'},
                         {'description': 'Microsoft. (2018, May 30). About '
                                         'Event Tracing. Retrieved June 7, '
                                         '2019.',
                          'source_name': 'Microsoft About Event Tracing 2018',
                          'url': 'https://docs.microsoft.com/en-us/windows/desktop/etw/consuming-events'},
                         {'description': 'Palantir. (2018, December 24). '
                                         'Tampering with Windows Event '
                                         'Tracing: Background, Offense, and '
                                         'Defense. Retrieved June 7, 2019.',
                          'source_name': 'Medium Event Tracing Tampering 2018',
                          'url': 'https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63'}],
 'id': 'attack-pattern--74d2a63f-3c7b-4852-92da-02d8fbab16da',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-10-24T17:48:57.704Z',
 'name': 'Indicator Blocking',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Rob Smith', 'Lucas Heiligenstein'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows', 'macOS', 'Linux', 'ESXi'],
 'x_mitre_version': '1.5'}
Quick Actions
Related Threat Actors (2)
APT5
High

APT41
High