Skip to content

Discover why insider threats have overtaken external attacks and how AI is making them harder to detect — Read the Release

MITRE Publishes Code Signing Policy Modification T1553.006 in the ATT&CK Framework

  • May 20, 2021
  • Abel Morales
  • 2 minutes to read

Table of Contents

    On April 27, 2021, MITRE released a significant update to the MITRE ATT&CK framework which included several new and updated techniques, including T1553.006, code signing policy modification. I had submitted this technique to MITRE and I will explain this in more detail and offer guidelines on how you can detect activity that indicates the use of this technique in your network.

    Introduction to Code Signing Policy Modification T1553.006

    Adversaries are developing new malware to obtain initial access and persist in the victim’s network. Advanced persistent threats (APTs) develop custom malware that endpoint protection solutions do not have coverage to prevent. In some instances, APTs modify drivers to obtain kernel-level access to the operating system to further their objective. However, Windows provides Driver Signature Enforcement (DSE) which requires a valid certificate to install a driver — System Integrity Protection (SIP) is the macOS equivalent of DSE. Adversaries can modify the policy to switch to developer mode which bypasses DSE.

    Detection

    The security operations center (SOC) can detect the modification of the code policy with the correct visibility. Solutions such as an endpoint detection and response (EDR) provide the granular level of logging to identify when the DSE is modified. 


    For organizations without an EDR, sysmon is likely an alternative option to provide visibility on endpoints. Another option is to leverage native Windows logging to enable process creations and registry key modifications. The methods to identify this activity are the following:

    1. Command line monitoring for:
      1. Windows
        bcdedit.exe -set TESTSIGNING ON

    1. MacOS
      csrutil disable

    1. Registry key modifications
      Windows
      HKCUSoftwarePoliciesMicrosoftWindows NTDriver Signing

    Modifications to the code signing policy isn’t likely to occur. However, if this is seen in an environment, it warrants an investigation. It is possible the credentials identified performing the activity are compromised. Therefore, it is important to have logs available for a minimum of 30 days to retroactively search for this activity. 

    Conclusion

    Although APTs used this activity in the past, it is possible for an insider threat to leverage the same technique. Organizations need to implement a security in-depth strategy that focuses on multiple layers of protection and detection. Exabeam provides visibility into key techniques from the MITRE ATT&CK framework adversaries are leveraging to attack organizations. Exabeam customers will have coverage for T1553.006 in the latest content pack released this week.

    Abel Morales

    Abel Morales

    Principal Sales Engineer | Exabeam | Abel Morales is a Senior Security Engineer based in Atlanta, GA. Prior to Exabeam, Abel has over ten years of experience in information security in companies such as Verizon, Syniverse, McKesson, and InterContinental Exchange (NYSE). In his previous role, he was responsible for managing incidents, performing technical analysis, and communicating with audiences of various levels. He received a B.S. degree in Information Technology and an MBA from Kennesaw State University. He is passionate about threat hunting, digital forensics, and incident response. He holds industry certifications such as CISSP, GCIH, and MCSA.

    More posts by Abel Morales

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • White Paper

      Architecting Threat Detection, Investigation, and Response (TDIR)

    • White Paper

      A CISO’s Guide to Rethinking Insider Risk

    • Video

      Automated Threat Timelines

    • Video

      Exabeam Nova: End-to-End AI

    • Video

      Open and Agnostic Security Operations With the New-Scale Platform

    • Video

      Natural Language Processing

    • Show More