Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunity
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to ATT&CK Hub
T1548

Abuse Elevation Control Mechanism

Privilege Escalation
Featured

Adversaries may abuse elevation control mechanisms like UAC bypass to gain higher privileges without prompting users.

View on MITRE ATT&CK

Real-World Example

Many commodity malware families use UAC bypass techniques to elevate privileges silently, such as the fodhelper bypass.

Defense Strategies

  • Set UAC to highest level
  • Remove admin rights from standard users
  • Monitor for bypass techniques
  • Enable virtualization-based security

Detection Methods

  • Monitor for UAC bypass indicators
  • Track auto-elevation binaries
  • Detect suspicious COM object access

Related Techniques in Privilege Escalation

T1068

Exploitation for Privilege Escalation

Ready to explore more techniques and join the community?