EXPLORE
← Back to Explore
T1531

Account Access Removal

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials, revoked permissions for SaaS platforms such as Sharepoint) to remove access to accounts.(Citation: Obsidian Security SaaS Ransomware June 2023) Adversaries may also subsequently log off and/or perform a [System Shutdown/Reboot](https://attack.mitre.org/techniques/T1529) to set malicious chan...

LinuxmacOSWindowsSaaSIaaSOffice SuiteESXi
27
Detections
3
Sources
2
Threat Actors

BY SOURCE

12elastic9sigma6splunk_escu

PROCEDURES (16)

General Monitoring6 detections

Auto-extracted: 6 detections for general monitoring

Cloud4 detections

Auto-extracted: 4 detections for cloud

Authentication Monitoring2 detections

Auto-extracted: 2 detections for authentication monitoring

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Credential2 detections

Auto-extracted: 2 detections for credential

Service1 detections

Auto-extracted: 1 detections for service

Privilege1 detections

Auto-extracted: 1 detections for privilege

Cloud1 detections

Auto-extracted: 1 detections for cloud

Api1 detections

Auto-extracted: 1 detections for api

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Service1 detections

Auto-extracted: 1 detections for service

Aws1 detections

Auto-extracted: 1 detections for aws

Privilege1 detections

Auto-extracted: 1 detections for privilege

Aws1 detections

Auto-extracted: 1 detections for aws

Api1 detections

Auto-extracted: 1 detections for api

THREAT ACTORS (2)

DETECTIONS (27)