Impact

T1531: Account Access Removal

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed crede...

T1531 · Technique ·7 platforms ·2 groups

Description

Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials, revoked permissions for SaaS platforms such as Sharepoint) to remove access to accounts.(Citation: Obsidian Security SaaS Ransomware June 2023) Adversaries may also subsequently log off and/or perform a System Shutdown/Reboot to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)

In Windows, Net utility, Set-LocalUser and Set-ADAccountPassword PowerShell cmdlets may be used by adversaries to modify user accounts. Accounts could also be disabled by Group Policy. In Linux, the passwd utility may be used to change passwords. On ESXi servers, accounts can be removed or modified via esxcli (system account set, system account remove).

Adversaries who use ransomware or similar attacks may first perform this and other Impact behaviors, such as Data Destruction and Defacement, in order to impede incident response/recovery before completing the Data Encrypted for Impact objective.

Platforms

LinuxmacOSWindowsSaaSIaaSOffice SuiteESXi

Threat Groups (2)

IDGroupContext
G1024Akira[Akira](https://attack.mitre.org/groups/G1024) deletes administrator accounts in victim networks prior to encryption.(Citation: Secureworks GOLD SAHAR...
G1004LAPSUS$[LAPSUS$](https://attack.mitre.org/groups/G1004) has removed a targeted organization's global admin accounts to lock the organization out of all acces...

Associated Software (4)

IDNameTypeContext
S0576MegaCortexMalware[MegaCortex](https://attack.mitre.org/software/S0576) has changed user account passwords and logged users off the system.(Citation: IBM MegaCortex)
S0372LockerGogaMalware[LockerGoga](https://attack.mitre.org/software/S0372) has been observed changing account passwords and logging off current users.(Citation: CarbonBlac...
S0688MeteorMalware[Meteor](https://attack.mitre.org/software/S0688) has the ability to change the password of local users on compromised hosts and can log off users.(Ci...
S1134DEADWOODMalware[DEADWOOD](https://attack.mitre.org/software/S1134) changes the password for local and domain users via <code>net.exe</code> to a random 32 character ...

References

Frequently Asked Questions

What is T1531 (Account Access Removal)?

T1531 is a MITRE ATT&CK technique named 'Account Access Removal'. It belongs to the Impact tactic(s). Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed crede...

How can T1531 be detected?

Detection of T1531 (Account Access Removal) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1531?

Follow defense-in-depth principles including network segmentation, least privilege access, security monitoring, and regular patching to reduce the risk of this technique.

Which threat groups use T1531?

Known threat groups using T1531 include: Akira, LAPSUS$.