MITRE ATT&CK Technique
Defense Evasion
T1601
Description
Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file. To change the operating system, the adversary typically only needs to affect this one file, replacing or modifying it. This can either be done live in memory during system runtime for immediate effect, or in storage to implement the change on the next boot of the network device.
Supported Platforms
Network Devices
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2020-10-19T19:42:19.740Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Adversaries may make changes to the operating system of '
'embedded network devices to weaken defenses and provide new '
'capabilities for themselves. On such devices, the operating '
'systems are typically monolithic and most of the device '
'functionality and capabilities are contained within a single '
'file.\n'
'\n'
'To change the operating system, the adversary typically only '
'needs to affect this one file, replacing or modifying it. '
'This can either be done live in memory during system runtime '
'for immediate effect, or in storage to implement the change '
'on the next boot of the network device.',
'external_references': [{'external_id': 'T1601',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1601'},
{'description': 'Cisco. (n.d.). Cisco IOS Software '
'Integrity Assurance - Cisco IOS '
'Image File Verification. Retrieved '
'October 19, 2020.',
'source_name': 'Cisco IOS Software Integrity '
'Assurance - Image File Verification',
'url': 'https://tools.cisco.com/security/center/resources/integrity_assurance.html#7'},
{'description': 'Cisco. (n.d.). Cisco IOS Software '
'Integrity Assurance - Cisco IOS '
'Run-Time Memory Integrity '
'Verification. Retrieved October 19, '
'2020.',
'source_name': 'Cisco IOS Software Integrity '
'Assurance - Run-Time Memory '
'Verification',
'url': 'https://tools.cisco.com/security/center/resources/integrity_assurance.html#13'}],
'id': 'attack-pattern--ae7f3575-0a5e-427e-991b-fe03ad44c754',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'defense-evasion'}],
'modified': '2025-10-24T17:49:13.730Z',
'name': 'Modify System Image',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': False,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['Network Devices'],
'x_mitre_version': '1.1'}