Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or wipe disk structures like the master boot record (MBR). A complete wipe of all disk sectors may be attempted.
To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware used for wiping disks may have worm-like features to propagate across a network by leveraging additional techniques like Valid Accounts, OS Credential Dumping, and SMB/Windows Admin Shares.(Citation: Novetta Blockbuster Destructive Malware)
On network devices, adversaries may wipe configuration files and other data from the device using Network Device CLI commands such as erase.(Citation: erase_cmd_cisco)
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| AC-03 | Access Enforcement | Protects | T1561 | Disk Wipe | |
| AC-06 | Least Privilege | Protects | T1561 | Disk Wipe | |
| CM-02 | Baseline Configuration | Protects | T1561 | Disk Wipe | |
| CP-10 | System Recovery and Reconstitution | Protects | T1561 | Disk Wipe | |
| CP-02 | Contingency Plan | Protects | T1561 | Disk Wipe | |
| CP-07 | Alternate Processing Site | Protects | T1561 | Disk Wipe | |
| CP-09 | System Backup | Protects | T1561 | Disk Wipe | |
| SI-03 | Malicious Code Protection | Protects | T1561 | Disk Wipe | |
| SI-04 | System Monitoring | Protects | T1561 | Disk Wipe | |
| SI-07 | Software, Firmware, and Information Integrity | Protects | T1561 | Disk Wipe |
| Technique ID | Technique Name | Number of Mappings |
|---|---|---|
| T1561.002 | Disk Structure Wipe | 10 |
| T1561.001 | Disk Content Wipe | 10 |