Restrict Web-Based Content

Restrict use of certain websites, block downloads/attachments, block Javascript, restrict browser extensions, etc.

ID: M1021
Version: 1.0
Created: 06 June 2019
Last Modified: 06 June 2019

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1059 Command and Scripting Interpreter

Script blocking extensions can help prevent the execution of scripts and HTA files that may commonly be used during the exploitation process. For malicious code served up through ads, adblockers can help prevent that code from executing in the first place.

.005 Visual Basic

Script blocking extensions can help prevent the execution of scripts and HTA files that may commonly be used during the exploitation process. For malicious code served up through ads, adblockers can help prevent that code from executing in the first place.

.007 JavaScript

Script blocking extensions can help prevent the execution of JavaScript and HTA files that may commonly be used during the exploitation process. For malicious code served up through ads, adblockers can help prevent that code from executing in the first place.

Enterprise T1659 Content Injection

Consider blocking download/transfer and execution of potentially uncommon file types known to be used in adversary campaigns.

Enterprise T1555 .003 Credentials from Password Stores: Credentials from Web Browsers

Restrict or block web-based content that could be used to extract session cookies or credentials stored in browsers. Use browser security settings, such as disabling third-party cookies and restricting browser extensions, to limit the attack surface.

Enterprise T1189 Drive-by Compromise

For malicious code served up through ads, adblockers can help prevent that code from executing in the first place.

Script blocking extensions can help prevent the execution of JavaScript that may commonly be used during the exploitation process.

Enterprise T1568 Dynamic Resolution

In some cases a local DNS sinkhole may be used to help prevent behaviors associated with dynamic resolution.

.002 Domain Generation Algorithms

In some cases a local DNS sinkhole may be used to help prevent DGA-based command and control at a reduced cost.

Enterprise T1567 Exfiltration Over Web Service

Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services.

.001 Exfiltration to Code Repository

Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services.

.002 Exfiltration to Cloud Storage

Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services.

.003 Exfiltration to Text Storage Sites

Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services.

Enterprise T1566 Phishing

Determine if certain websites or attachment types (ex: .scr, .exe, .pif, .cpl, etc.) that can be used for phishing are necessary for business operations and consider blocking access if activity cannot be monitored well or if it poses a significant risk.

.001 Spearphishing Attachment

Block unknown or unused attachments by default that should not be transmitted over email as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some email scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious attachments.

.002 Spearphishing Link

Determine if certain websites that can be used for spearphishing are necessary for business operations and consider blocking access if activity cannot be monitored well or if it poses a significant risk.

.003 Spearphishing via Service

Determine if certain social media sites, personal webmail services, or other service that can be used for spearphishing is necessary for business operations and consider blocking access if activity cannot be monitored well or if it poses a significant risk.

Enterprise T1528 Steal Application Access Token

Administrators can block end-user consent to OAuth applications, disabling users from authorizing third-party apps through OAuth 2.0 and forcing administrative consent for all requests. They can also block end-user registration of applications by their users, to reduce risk. A Cloud Access Security Broker can also be used to ban applications.

Azure offers a couple of enterprise policy settings in the Azure Management Portal that may help:

"Users -> User settings -> App registrations: Users can register applications" can be set to "no" to prevent users from registering new applications. "Enterprise applications -> User settings -> Enterprise applications: Users can consent to apps accessing company data on their behalf" can be set to "no" to prevent users from consenting to allow third-party multi-tenant applications

Enterprise T1539 Steal Web Session Cookie

Restrict or block web-based content that could be used to extract session cookies or credentials stored in browsers. Use browser security settings, such as disabling third-party cookies and restricting browser extensions, to limit the attack surface.

Enterprise T1218 System Binary Proxy Execution

Restrict use of certain websites, block downloads/attachments, block Javascript, restrict browser extensions, etc.

.001 Compiled HTML File

Consider blocking download/transfer and execution of potentially uncommon file types known to be used in adversary campaigns, such as CHM files

Enterprise T1127 Trusted Developer Utilities Proxy Execution

Consider disabling software installation or execution from the internet via developer utilities.

.002 ClickOnce

Disable ClickOnce installations from the internet using the following registry key: \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Security\TrustManager\PromptingLevel — Internet:Disabled[1]

Enterprise T1550 .001 Use Alternate Authentication Material: Application Access Token

Update corporate policies to restrict what types of third-party applications may be added to any online service or tool that is linked to the company's information, accounts or network (e.g., Google, Microsoft, Dropbox, Basecamp, GitHub). However, rather than providing high-level guidance on this, be extremely specific—include a list of per-approved applications and deny all others not on the list. Administrators may also block end-user consent through administrative portals, such as the Azure Portal, disabling users from authorizing third-party apps through OAuth and forcing administrative consent.[2]

Enterprise T1204 User Execution

If a link is being visited by a user, block unknown or unused files in transit by default that should not be downloaded or by policy from suspicious sites as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some download scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious files.

.001 Malicious Link

If a link is being visited by a user, block unknown or unused files in transit by default that should not be downloaded or by policy from suspicious sites as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some download scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious files.

Enterprise T1102 Web Service

Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

.001 Dead Drop Resolver

Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

.002 Bidirectional Communication

Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

.003 One-Way Communication

Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

References