Tactic: Persistence

Technique: OS Specific

Each operating system has their own set of standards and protocols that define how system startup should behave. These OS specific methods can be leveraged to implement persistence of malware and/or backdoors for the attacker to install and consistently apply.

Technique in practice

Video: persistence mechanisms

Mitigations

Startup mechanisms should be restricted to user accounts with higher privileges.

Detections

Virusscanners can often detect the installation of malicious payloads and malware.

Documented incidents with autonomous robots

No incidents known at the time of writing.