T1070.008 Clear Mailbox Data Mappings

Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or operating system, such as export requests.

Adversaries may manipulate emails and mailbox data to remove logs, artifacts, and metadata, such as evidence of Phishing/Internal Spearphishing, Email Collection, Mail Protocols for command and control, or email-based exfiltration such as Exfiltration Over Alternative Protocol. For example, to remove evidence on Exchange servers adversaries have used the <code>ExchangePowerShell</code> PowerShell module, including <code>Remove-MailboxExportRequest</code> to remove evidence of mailbox exports.(Citation: Volexity SolarWinds)(Citation: ExchangePowerShell Module) On Linux and macOS, adversaries may also delete emails through a command line utility called <code>mail</code> or use AppleScript to interact with APIs on macOS.(Citation: Cybereason Cobalt Kitty 2017)(Citation: mailx man page)

Adversaries may also remove emails and metadata/headers indicative of spam or suspicious activity (for example, through the use of organization-wide transport rules) to reduce the likelihood of malicious emails being detected by security products.(Citation: Microsoft OAuth Spam 2022)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
SI-12 Information Management and Retention Protects T1070.008 Clear Mailbox Data
AC-04 Information Flow Enforcement Protects T1070.008 Clear Mailbox Data
AC-20 Use of External Systems Protects T1070.008 Clear Mailbox Data
AC-16 Security and Privacy Attributes Protects T1070.008 Clear Mailbox Data
AC-17 Remote Access Protects T1070.008 Clear Mailbox Data
AC-18 Wireless Access Protects T1070.008 Clear Mailbox Data
AC-19 Access Control for Mobile Devices Protects T1070.008 Clear Mailbox Data
AC-02 Account Management Protects T1070.008 Clear Mailbox Data
AC-03 Access Enforcement Protects T1070.008 Clear Mailbox Data
AC-05 Separation of Duties Protects T1070.008 Clear Mailbox Data
AC-06 Least Privilege Protects T1070.008 Clear Mailbox Data
CA-07 Continuous Monitoring Protects T1070.008 Clear Mailbox Data
CM-02 Baseline Configuration Protects T1070.008 Clear Mailbox Data
CM-06 Configuration Settings Protects T1070.008 Clear Mailbox Data
CP-06 Alternate Storage Site Protects T1070.008 Clear Mailbox Data
CP-07 Alternate Processing Site Protects T1070.008 Clear Mailbox Data
CP-09 System Backup Protects T1070.008 Clear Mailbox Data
SC-36 Distributed Processing and Storage Protects T1070.008 Clear Mailbox Data
SC-04 Information in Shared System Resources Protects T1070.008 Clear Mailbox Data
SI-12 Information Management and Retention Protects T1070.008 Clear Mailbox Data
SI-03 Malicious Code Protection Protects T1070.008 Clear Mailbox Data
SI-04 System Monitoring Protects T1070.008 Clear Mailbox Data
SI-07 Software, Firmware, and Information Integrity Protects T1070.008 Clear Mailbox Data
PUR-AS-E5 Audit Solutions Technique Scores T1070.008 Clear Mailbox Data