Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 298

Defense Evasion

What is Defense Evasion?

Defense EvasionThe MITRE ATT&CK tactic (TA0005) covering techniques attackers use to avoid detection, disable security tools, and hide their activity on a target system.


Defense Evasion (MITRE ATT&CK tactic TA0005) groups techniques designed to bypass, blind, or fool security controls. It is one of the largest tactics in the matrix and includes obfuscated and encrypted payloads, process injection, DLL side-loading, signed-binary proxy execution (LOLBins), disabling or uninstalling EDR/AV, clearing event logs, masquerading as legitimate processes, abusing trusted directories, and using rootkits or BYOVD (Bring Your Own Vulnerable Driver) attacks. Defense Evasion is often interleaved with other tactics throughout an intrusion. Defenders counter it with kernel-level telemetry, EDR tamper protection, immutable logging, signed-binary inventory monitoring, and behavioural detections that look at intent and chains of activity rather than individual signatures.

Examples

  1. 01

    Bringing a vulnerable signed driver to disable an EDR agent in kernel mode.

  2. 02

    Renaming a malicious executable to svchost.exe and placing it in C:\Windows\.

Frequently asked questions

What is Defense Evasion?

The MITRE ATT&CK tactic (TA0005) covering techniques attackers use to avoid detection, disable security tools, and hide their activity on a target system. It belongs to the Defense & Operations category of cybersecurity.

What does Defense Evasion mean?

The MITRE ATT&CK tactic (TA0005) covering techniques attackers use to avoid detection, disable security tools, and hide their activity on a target system.

How does Defense Evasion work?

Defense Evasion (MITRE ATT&CK tactic TA0005) groups techniques designed to bypass, blind, or fool security controls. It is one of the largest tactics in the matrix and includes obfuscated and encrypted payloads, process injection, DLL side-loading, signed-binary proxy execution (LOLBins), disabling or uninstalling EDR/AV, clearing event logs, masquerading as legitimate processes, abusing trusted directories, and using rootkits or BYOVD (Bring Your Own Vulnerable Driver) attacks. Defense Evasion is often interleaved with other tactics throughout an intrusion. Defenders counter it with kernel-level telemetry, EDR tamper protection, immutable logging, signed-binary inventory monitoring, and behavioural detections that look at intent and chains of activity rather than individual signatures.

How do you defend against Defense Evasion?

Defences for Defense Evasion typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Defense Evasion?

Common alternative names include: Defence Evasion, TA0005.

Related terms

See also