"security products. it then establishes five scheduled tasks and windows management instrumentation ( wmi ) event subscriptions that maintain persistence across reboots, logons and at 30 - minute intervals. a tight polling loop kills matching av processes every 100 milliseconds fo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
"security products. it then establishes five scheduled tasks and windows management instrumentation ( wmi ) event subscriptions that maintain persistence across reboots, logons and at 30 - minute intervals. a tight polling loop kills matching av processes every 100 milliseconds fo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
64%
"signed adware operation disables antivirus across 23, 000 hosts a signed software operation linked to a company called dragon boss solutions llc has reportedly been silently disabling antivirus products on more than 23, 000 endpoints worldwide according to research published by h…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
45%
"signed adware operation disables antivirus across 23, 000 hosts a signed software operation linked to a company called dragon boss solutions llc has reportedly been silently disabling antivirus products on more than 23, 000 endpoints worldwide according to research published by h…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
35%
"signed adware operation disables antivirus across 23, 000 hosts a signed software operation linked to a company called dragon boss solutions llc has reportedly been silently disabling antivirus products on more than 23, 000 endpoints worldwide according to research published by h…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints