EXPLORE
← Back to Explore
T1653

Power Settings

Adversaries may impair a system's ability to hibernate, reboot, or shut down in order to extend access to infected machines. When a computer enters a dormant state, some or all software and hardware may cease to operate which can disrupt malicious activity.(Citation: Sleep, shut down, hibernate) Adversaries may abuse system utilities and configuration settings to maintain access by preventing machines from entering a state, such as standby, that can terminate malicious activity.(Citation: Micro...

WindowsLinuxmacOSNetwork Devices
1
Detections
1
Sources
0
Threat Actors

BY SOURCE

1sigma

PROCEDURES (1)

Process Creation Monitoring1 detections

Auto-extracted: 1 detections for process creation monitoring

DETECTIONS (1)