Skip to content

Hide Navigation Hide TOC

Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463)

Application Isolation and Sandboxing refers to the technique of restricting the execution of code to a controlled and isolated environment (e.g., a virtual environment, container, or sandbox). This method prevents potentially malicious code from affecting the rest of the system or network by limiting access to sensitive resources and critical operations. The goal is to contain threats and minimize their impact. This mitigation can be implemented through the following measures:

Browser Sandboxing:

  • Use Case: Implement browser sandboxing to isolate untrusted web content, preventing malicious web pages or scripts from accessing sensitive system files.
  • Implementation: Use tools like Google Chrome's built-in sandbox or deploy solutions like Bromium to secure user web interactions.

Application Virtualization:

  • Use Case: Deploy critical or high-risk applications in a virtualized environment to ensure any compromise does not affect the host system.
  • Implementation: Use application virtualization platforms to run applications in isolated environments.

Email Attachment Sandboxing:

  • Use Case: Route email attachments to a sandbox environment to detect and block malware before delivering emails to end-users.
  • Implementation: Integrate security solutions with sandbox capabilities to analyze email attachments.

Endpoint Sandboxing:

  • Use Case: Run all downloaded files and applications in a restricted environment to monitor their behavior for malicious activity.
  • Implementation: Use endpoint protection tools for sandboxing at the endpoint level.
Cluster A Galaxy A Cluster B Galaxy B Level
Escape to Host - T1611 (4a5b7ade-8bb5-4853-84ed-23f262002665) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Drive-by Compromise - T1189 (d742a578-d70e-4d0e-96a6-02a9c30204e6) Attack Pattern 1
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Exploitation of Remote Services - T1210 (9db0cf3a-a3c9-4012-8268-123b9db6fd82) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Distributed Component Object Model - T1021.003 (68a0c5ed-bee2-4513-830d-5b0d650139bd) Attack Pattern 1
Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploitation for Defense Evasion - T1211 (fe926152-f431-4baf-956c-4ad3cb0bf23b) Attack Pattern 1
Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Exploitation for Credential Access - T1212 (9c306d8d-cde7-4b4c-b6e8-d0bb16caca36) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
SVG Smuggling - T1027.017 (78b9e70d-1605-459c-b23d-e3a25036968c) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Component Object Model - T1559.001 (2f6b4ed7-fef1-44ba-bcb8-1b4beb610b64) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Dynamic Data Exchange - T1559.002 (232a7e42-cd6e-4902-8fe9-2960f529dd4d) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
HTML Smuggling - T1027.006 (d4dc46e3-5ba5-45b9-8204-010867cacfcb) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Remote Services - T1021 (54a649ff-439a-41a4-9856-8d144a2551ba) Attack Pattern Distributed Component Object Model - T1021.003 (68a0c5ed-bee2-4513-830d-5b0d650139bd) Attack Pattern 2
SVG Smuggling - T1027.017 (78b9e70d-1605-459c-b23d-e3a25036968c) Attack Pattern Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern 2
Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern Component Object Model - T1559.001 (2f6b4ed7-fef1-44ba-bcb8-1b4beb610b64) Attack Pattern 2
Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern Dynamic Data Exchange - T1559.002 (232a7e42-cd6e-4902-8fe9-2960f529dd4d) Attack Pattern 2
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern HTML Smuggling - T1027.006 (d4dc46e3-5ba5-45b9-8204-010867cacfcb) Attack Pattern 2