T1070.008 Clear Mailbox Data

Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or operating system, such as export requests.

Adversaries may manipulate emails and mailbox data to remove logs, artifacts, and metadata, such as evidence of Phishing/Internal Spearphishing, Email Collection, Mail Protocols for command and control, or email-based exfiltration such as Exfiltration Over Alternative Protocol. For example, to remove evidence on Exchange servers adversaries have used the <code>ExchangePowerShell</code> PowerShell module, including <code>Remove-MailboxExportRequest</code> to remove evidence of mailbox exports.(Citation: Volexity SolarWinds)(Citation: ExchangePowerShell Module) On Linux and macOS, adversaries may also delete emails through a command line utility called <code>mail</code> or use AppleScript to interact with APIs on macOS.(Citation: Cybereason Cobalt Kitty 2017)(Citation: mailx man page)

Adversaries may also remove emails and metadata/headers indicative of spam or suspicious activity (for example, through the use of organization-wide transport rules) to reduce the likelihood of malicious emails being detected by security products.(Citation: Microsoft OAuth Spam 2022)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
ID.AM-08.03 Data governance and lifecycle management Mitigates T1070.008 Clear Mailbox Data
Comments
Storing data remotely can be used to properly manage data so that adversaries won't be able to modify mail and mail application data. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
References
    ID.AM-08.05 Data destruction procedures Mitigates T1070.008 Clear Mailbox Data
    Comments
    Storing data remotely can be used to properly manage data so that adversaries won't be able to modify mail and mail application data. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
    References

      NIST 800-53 Mappings

      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
      CA-07 Continuous Monitoring mitigates T1070.008 Clear Mailbox Data
      CM-06 Configuration Settings mitigates T1070.008 Clear Mailbox Data
      AC-17 Remote Access mitigates T1070.008 Clear Mailbox Data
      CP-07 Alternate Processing Site mitigates T1070.008 Clear Mailbox Data
      CP-06 Alternate Storage Site mitigates T1070.008 Clear Mailbox Data
      SC-36 Distributed Processing and Storage mitigates T1070.008 Clear Mailbox Data
      CP-09 System Backup mitigates T1070.008 Clear Mailbox Data
      AC-19 Access Control for Mobile Devices mitigates T1070.008 Clear Mailbox Data
      SC-04 Information in Shared System Resources mitigates T1070.008 Clear Mailbox Data
      SI-12 Information Management and Retention mitigates T1070.008 Clear Mailbox Data
      SI-12 Information Management and Retention mitigates T1070.008 Clear Mailbox Data
      SI-03 Malicious Code Protection mitigates T1070.008 Clear Mailbox Data
      SI-07 Software, Firmware, and Information Integrity mitigates T1070.008 Clear Mailbox Data
      AC-20 Use of External Systems mitigates T1070.008 Clear Mailbox Data
      AC-16 Security and Privacy Attributes mitigates T1070.008 Clear Mailbox Data
      AC-18 Wireless Access mitigates T1070.008 Clear Mailbox Data
      CM-02 Baseline Configuration mitigates T1070.008 Clear Mailbox Data
      SI-04 System Monitoring mitigates T1070.008 Clear Mailbox Data
      AC-04 Information Flow Enforcement mitigates T1070.008 Clear Mailbox Data
      AC-02 Account Management mitigates T1070.008 Clear Mailbox Data
      AC-03 Access Enforcement mitigates T1070.008 Clear Mailbox Data
      AC-05 Separation of Duties mitigates T1070.008 Clear Mailbox Data
      AC-06 Least Privilege mitigates T1070.008 Clear Mailbox Data

      Azure Mappings

      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
      file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1070.008 Clear Mailbox Data
      Comments
      This control can detect changes to files associated with this technique.
      References
      alerts_for_windows_machines Alerts for Windows Machines technique_scores T1070.008 Clear Mailbox Data

      GCP Mappings

      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
      google_secops Google Security Operations technique_scores T1070.008 Clear Mailbox Data
      Comments
      Google Security Operations is able to trigger an alert when indicators are cleared from the infrastructure. This technique was scored as minimal based on low or uncertain detection coverage factor.
      References

      AWS Mappings

      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
      amazon_inspector Amazon Inspector technique_scores T1070.008 Clear Mailbox Data
      Comments
      The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Due to this and the fact the security control is only supported for Linux platforms, the score is Minimal.
      References

        M365 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        PUR-AUS-E5 Audit Solutions Technique Scores T1070.008 Clear Mailbox Data
        Comments
        Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization. Microsoft's Audit Solutions protects from Clear Mailbox Data Rule attacks due to administrators can use use Get-TransportRule / Remove-TransportRule to discover and remove potentially malicious transport rules. License Requirements: Microsoft 365 E3 and E5
        References