Impair Defenses: Disable or Modify Tools

Adversaries may disable security tools to avoid potential detection of their tools and activities. This can take the form of disabling security software, modifying SELinux configuration, or other methods to interfere with security tools scanning or reporting information. This is typically done by abusing device administrator permissions or using system exploits to gain root access to the device to modify protected system files.

ID: T1629.003
Sub-technique of:  T1629
Tactic Type: Post-Adversary Device Access
Tactic: Defense Evasion
Platforms: Android
Version: 1.0
Created: 01 April 2022
Last Modified: 05 April 2022

Procedure Examples

ID Name Description
S0422 Anubis

Anubis can modify administrator settings and disable Play Protect.[1]

S0480 Cerberus

Cerberus disables Google Play Protect to prevent its discovery and deletion in the future.[2]

S0420 Dvmap

Dvmap can turn off VerifyApps, and can grant Device Administrator permissions via commands only, rather than using the UI.[3]

S0485 Mandrake

Mandrake can disable Play Protect.[4]

S0494 Zen

Zen can modify the SELinux enforcement mode.[5]


ID Mitigation Description
M1010 Deploy Compromised Device Detection Method

Mobile security software can typically detect if a device has been rooted or jailbroken and can inform the user, who can then take appropriate action.

M1001 Security Updates

Security updates frequently contain patches to vulnerabilities that can be exploited for root access.

M1004 System Partition Integrity

System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files.

M1011 User Guidance

Users should be taught the dangers of rooting or jailbreaking their device.


Users can view a list of active device administrators in the device settings.