Security Software Discovery - T1418.001 (1d44f529-6fe6-489f-8a01-6261ac43f05e)
Adversaries may attempt to get a listing of security applications and configurations that are installed on a device. This may include things such as mobile security products. Adversaries may use the information from Security Software Discovery during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempt specific actions.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Security Software Discovery - T1418.001 (1d44f529-6fe6-489f-8a01-6261ac43f05e) | Attack Pattern | Software Discovery - T1418 (198ce408-1470-45ee-b47f-7056050d4fc2) | Attack Pattern | 1 |