T1653: Power Settingss
Last updated
Last updated
Adversaries may impair a system's ability to hibernate, reboot, or shut down to extend access to infected machines. When a computer enters a dormant state, some or all software and hardware may cease to operate which can disrupt malicious activity.
Adversaries may abuse utilities and configuration settings to maintain access by preventing machines from entering a state, such as standby, that can terminate malicious activity.
Aware that some malware cannot survive system reboots, adversaries may entirely delete files used to invoke system shut down or reboot.
On Linux distributions we can change the behavior of the Standby, Reboot and the Power Off buttons. By modifying a file and giving the property a value of "ignore"
When a user tries to Power Off it never fully does it as seen below