Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may span both native defenses as well as supplemental capabilities installed by users or mobile endpoint administrators.
|M1010||Deploy Compromised Device Detection Method||
Mobile security software can typically detect if a device has been rooted or jailbroken and can inform the user, who can then take appropriate action.
An EMM/MDM can use the Android
Security updates often contain patches for vulnerabilities that could be exploited for root access. Root access is often a requirement to impairing defenses.
|M1004||System Partition Integrity||
System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files.
Providing user guidance around commonly abused features, such as the modal that requests for administrator permissions, should aid in preventing impairing defenses.
Mobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running. Application vetting can detect many techniques associated with impairing device defenses.