Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.[1][2]
Adversaries may accomplish this by disabling individual services of high importance to an organization, such as MSExchangeIS, which will make Exchange content inaccessible.[2] In some cases, adversaries may stop or disable many or all services to render systems unusable.[1] Services or processes may not allow for modification of their data stores while running. Adversaries may stop services or processes in order to conduct Data Destruction or Data Encrypted for Impact on the data stores of services like Exchange and SQL Server, or on virtual machines hosted on ESXi infrastructure.[3][4]
Threat actors may also disable or stop service in cloud environments. For example, by leveraging the DisableAPIServiceAccess API in AWS, a threat actor may prevent the service from creating service-linked roles on new accounts in the AWS Organization.[5][6]
| ID | Name | Description |
|---|---|---|
| S1194 | Akira _v2 | |
| S0640 | Avaddon |
Avaddon looks for and attempts to stop database processes.[10] |
| S1053 | AvosLocker |
AvosLocker has terminated specific processes before encryption.[11] |
| S0638 | Babuk |
Babuk can stop specific services related to backups.[12][13][14] |
| S1181 | BlackByte 2.0 Ransomware |
BlackByte 2.0 Ransomware can terminate running services.[15] |
| S1068 | BlackCat |
BlackCat has the ability to stop VM services on compromised networks.[16][17] |
| S1096 | Cheerscrypt |
Cheerscrypt has the ability to terminate VM processes on compromised hosts through execution of |
| S0611 | Clop |
Clop can kill several processes and services related to backups and security solutions.[19][20] |
| S0575 | Conti |
Conti can stop up to 146 Windows services related to security, backup, database, and email solutions through the use of |
| S0625 | Cuba |
Cuba has a hardcoded list of services and processes to terminate.[22] |
| S0659 | Diavol |
Diavol will terminate services using the Service Control Manager (SCM) API.[23] |
| S0605 | EKANS |
EKANS stops database, data backup solution, antivirus, and ICS-related processes.[24][25][26] |
| S1247 | Embargo |
Embargo has terminated active processes and services based on a hardcoded list using the |
| S1211 | Hannotog | |
| S0697 | HermeticWiper |
HermeticWiper has the ability to stop the Volume Shadow Copy service.[30] |
| S0431 | HotCroissant |
HotCroissant has the ability to stop services on the infected host.[31] |
| S1139 | INC Ransomware |
INC Ransomware can issue a command to kill a process on compromised hosts.[32] |
| G0119 | Indrik Spider |
Indrik Spider has used PsExec to stop services prior to the execution of ransomware.[33] |
| S0604 | Industroyer |
Industroyer’s data wiper module writes zeros into the registry keys in |
| S1245 | InvisibleFerret |
InvisibleFerret has terminated Chrome and Brave browsers using the |
| S0607 | KillDisk |
KillDisk terminates various processes to get the user to reboot the victim machine.[37] |
| G1004 | LAPSUS$ |
LAPSUS$ has shut down virtual machines from within a victim's on-premise VMware ESXi infrastructure.[38] |
| G0032 | Lazarus Group |
Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.[39] |
| S1199 | LockBit 2.0 |
LockBit 2.0 can automatically terminate processes that may interfere with the encryption or file extraction processes.[40] |
| S1202 | LockBit 3.0 |
LockBit 3.0 can terminate targeted processes and services related to security, backup, database management, and other applications that could stop or interfere with encryption.[41][42][43][44] |
| S0582 | LookBack | |
| S0449 | Maze |
Maze has stopped SQL services to ensure it can encrypt any database.[46] |
| G1051 | Medusa Group |
Medusa Group has terminated services related to backups, security, databases, communication, filesharing and websites.[47][48][49] |
| S1244 | Medusa Ransomware |
Medusa Ransomware has the capability to terminate services related to backups, security, databases, communication, filesharing and websites.[47][48][49] Medusa Ransomware has also utilized the |
| S0576 | MegaCortex |
MegaCortex can stop and disable services on the system.[50] |
| S1191 | Megazord |
Megazord has the ability to terminate a list of services and processes.[9] |
| S0688 | Meteor |
Meteor can disconnect all network adapters on a compromised host using |
| S0457 | Netwalker |
Netwalker can terminate system processes and services, some of which relate to backup software.[52] |
| S0365 | Olympic Destroyer |
Olympic Destroyer uses the API call |
| S0556 | Pay2Key |
Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service.[53] |
| S1058 | Prestige |
Prestige has attempted to stop the MSSQL Windows service to ensure successful encryption using |
| S0583 | Pysa | |
| S1242 | Qilin |
Qilin can terminate specific services on compromised hosts.[56][57][58] |
| S0481 | Ragnar Locker |
Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.[59] |
| S1212 | RansomHub |
RansomHub has the ability to terminate specified services.[60] |
| S0496 | REvil |
REvil has the capability to stop services and kill processes.[61][62] |
| S1150 | ROADSWEEP | |
| S0400 | RobbinHood |
RobbinHood stops 181 Windows services on the system before beginning the encryption process.[64] |
| S1073 | Royal |
Royal can use |
| S0446 | Ryuk |
Ryuk has called |
| G0034 | Sandworm Team |
Sandworm Team attempts to stop the MSSQL Windows service to ensure successful encryption of locked files.[54] |
| S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has the capability to stop processes and services.[67] |
| S1217 | VIRTUALPITA |
VIRTUALPITA can start and stop the |
| S0366 | WannaCry |
WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.[69][3] |
| G0102 | Wizard Spider |
Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.[70] |
| ID | Mitigation | Description |
|---|---|---|
| M1030 | Network Segmentation |
Operate intrusion detection, analysis, and response systems on a separate network from the production environment to lessen the chances that an adversary can see and interfere with critical response functions. |
| M1060 | Out-of-Band Communications Channel |
Develop and enforce security policies that include the use of out-of-band communication channels for critical communications during a security incident.[71] |
| M1022 | Restrict File and Directory Permissions |
Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services. |
| M1024 | Restrict Registry Permissions |
Ensure proper registry permissions are in place to inhibit adversaries from disabling or interfering with critical services. |
| M1018 | User Account Management |
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service configurations. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0021 | Behavioral Detection for Service Stop across Platforms | AN0061 |
Adversary disables or stops critical services (e.g., Exchange, SQL, AV, endpoint monitoring) using native utilities or API calls, often preceding destructive actions (T1485, T1486). Behavioral chain: Elevated execution context + stop-service or sc.exe or ChangeServiceConfigW + terminated or disabled service + possible follow-up file manipulation. |
| AN0062 |
Adversary executes systemctl or service stop targeting high-value services (e.g., mysql, sshd), possibly followed by rm or shred against data stores. Behavioral chain: sudo/su usage + stop command + /var/log/messages or syslog entries + file access/delete. |
||
| AN0063 |
Use of launchctl to stop services or kill critical background processes (e.g., securityd, com.apple.*), typically followed by command-line tools like rm or diskutil. Behavioral chain: Terminal or remote shell + launchctl bootout/disable + process termination + follow-on modification. |
||
| AN0064 |
Attacker disables VM-related services or stops VMs forcibly to target vmdk or logs. Behavioral chain: esxcli or vim-cmd stop + audit log showing user privilege use + datastore file manipulation. |