Preventions
- Home
- - Preventions
- -PV037
- ID: PV037
- Created: 31st July 2024
- Updated: 31st July 2024
- Platform: Windows
- Contributor: Khaled A. Mohamed
Restrict Removable Disk Mounting, Group Policy
Using Group Policy on Windows it is possible to block execute, read, and write operations related to a removeable disk, such as an SD card or USB mass storage devices.
In the Group Policy Editor, navigate to:Computer Configuration -> Administrative Templates -> System -> Removable Storage Access
Open the following policies and set them all to Enabled:
Removeable Disk: Deny execute access
Removeable Disk: Deny read access
Removeable Disk: Deny write access
Sections
ID | Name | Description |
---|---|---|
IF027 | Installing Malicious Software | The subject deliberately or inadvertently introduces malicious software (commonly referred to as malware) into the organization’s environment. This may occur via manual execution, automated dropper delivery, browser‑based compromise, USB usage, or sideloading through legitimate processes. Malicious software includes trojans, keyloggers, ransomware, credential stealers, remote access tools (RATs), persistence frameworks, or other payloads designed to cause harm, exfiltrate data, degrade systems, or maintain unauthorized control.
Installation of malicious software represents a high-severity infringement, regardless of whether the subject's intent was deliberate or negligent. In some cases, malware introduction is the culmination of prior behavioral drift (e.g. installing unapproved tools or disabling security controls), while in others it may signal malicious preparation or active compromise.
This Section is distinct from general “Installing Unapproved Software”, which covers non‑malicious or policy-violating tools. Here, the software itself is malicious in purpose or impact, even if delivered under benign pretenses. |
IF002.001 | Exfiltration via USB Mass Storage Device | A subject exfiltrates data using a USB-connected mass storage device, such as a USB flash drive or USB external hard-drive. |
PR014.001 | USB Mass Storage Device Formatting | A subject formats a USB mass storage device on a target system with a file system capable of being written to by the target system. |
ME005.001 | USB Mass Storage | A subject can mount and write to a USB mass storage device. |
PR002.001 | USB Mass Storage Device Mounting | A subject may attempt to mount a USB Mass Storage device on a target system. |
AF022.003 | Portable Hypervisors | The subject uses a portable hypervisor to launch a virtual machine from removable media or user-space directories, enabling covert execution of tools, data staging, or operational activities. These hypervisors can run without installation, system-wide configuration changes, or elevated privileges—bypassing standard application control, endpoint detection, and logging.
Portable hypervisors are often used to:
Example Scenarios:
|
MT017.001 | Nation-State Alignment | The subject is a current or former asset of a nation-state intelligence service, operating inside the organization with pre-existing loyalty to, or direct affiliation with, a foreign government. Unlike insiders who develop espionage motives post-employment, this subject is often inserted, recruited prior to hiring, or cultivated externally over time and then encouraged to seek access to a target organization.
Their motive is the advancement of strategic objectives on behalf of a foreign nation-state. These objectives may include extracting sensitive information, degrading operational resilience, manipulating internal systems or decisions, weakening public or partner trust, or embedding long-term access for future exploitation. Such subjects may be formal intelligence officers, contract operatives, ideological affiliates, or individuals acting under recruitment, coercion, or influence.
Example Scenarios:
|