T1485 Data Destruction Mappings

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018)(Citation: Talos Olympic Destroyer 2018) Common operating system file deletion commands such as <code>del</code> and <code>rm</code> often only remove pointers to files without wiping the contents of the files themselves, making the files recoverable by proper forensic methodology. This behavior is distinct from Disk Content Wipe and Disk Structure Wipe because individual files are destroyed rather than sections of a storage disk or the disk's logical structure.

Adversaries may attempt to overwrite files and directories with randomly generated data to make it irrecoverable.(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018) In some cases politically oriented image files have been used to overwrite data.(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)

To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware designed for destroying data may have worm-like features to propagate across a network by leveraging additional techniques like Valid Accounts, OS Credential Dumping, and SMB/Windows Admin Shares.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Talos Olympic Destroyer 2018).

In cloud environments, adversaries may leverage access to delete cloud storage, cloud storage accounts, machine images, and other infrastructure crucial to operations to damage an organization or their customers.(Citation: Data Destruction - Threat Post)(Citation: DOJ - Cisco Insider)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-3 Access Enforcement Protects T1485 Data Destruction
AC-6 Least Privilege Protects T1485 Data Destruction
CM-2 Baseline Configuration Protects T1485 Data Destruction
CP-10 System Recovery and Reconstitution Protects T1485 Data Destruction
CP-2 Contingency Plan Protects T1485 Data Destruction
CP-7 Alternate Processing Site Protects T1485 Data Destruction
CP-9 System Backup Protects T1485 Data Destruction
SI-3 Malicious Code Protection Protects T1485 Data Destruction
SI-4 System Monitoring Protects T1485 Data Destruction
SI-7 Software, Firmware, and Information Integrity Protects T1485 Data Destruction
CVE-2019-3723 OpenManage Server Administrator primary_impact T1485 Data Destruction
CVE-2019-3750 Dell Command Update (DCU) primary_impact T1485 Data Destruction
CVE-2018-5459 WAGO PFC200 Series secondary_impact T1485 Data Destruction
CVE-2020-1111 Windows secondary_impact T1485 Data Destruction
CVE-2018-8355 ChakraCore secondary_impact T1485 Data Destruction
CVE-2020-0671 Windows secondary_impact T1485 Data Destruction
CVE-2019-1270 Windows primary_impact T1485 Data Destruction
CVE-2019-1118 Windows secondary_impact T1485 Data Destruction
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1485 Data Destruction
CVE-2020-1109 Windows secondary_impact T1485 Data Destruction
CVE-2020-1163 Microsoft Forefront Endpoint Protection primary_impact T1485 Data Destruction
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 secondary_impact T1485 Data Destruction
CVE-2018-8248 Microsoft Office secondary_impact T1485 Data Destruction
CVE-2018-8111 Microsoft Edge secondary_impact T1485 Data Destruction
CVE-2018-8607 Microsoft Dynamics 365 secondary_impact T1485 Data Destruction
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) secondary_impact T1485 Data Destruction
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) secondary_impact T1485 Data Destruction
CVE-2019-0609 Internet Explorer 11 secondary_impact T1485 Data Destruction
CVE-2018-8353 n/a secondary_impact T1485 Data Destruction
CVE-2018-8110 Microsoft Edge secondary_impact T1485 Data Destruction
CVE-2018-8575 Microsoft Project secondary_impact T1485 Data Destruction
CVE-2019-1031 Microsoft SharePoint Foundation secondary_impact T1485 Data Destruction
CVE-2020-9819 iOS uncategorized T1485 Data Destruction
CVE-2018-8337 Windows 10 uncategorized T1485 Data Destruction
action.malware.variety.Destroy data Destroy or corrupt stored data related-to T1485 Data Destruction
aws_rds AWS RDS technique_scores T1485 Data Destruction
aws_rds AWS RDS technique_scores T1485 Data Destruction
aws_rds AWS RDS technique_scores T1485 Data Destruction
aws_config AWS Config technique_scores T1485 Data Destruction
aws_s3 AWS S3 technique_scores T1485 Data Destruction
amazon_guardduty Amazon GuardDuty technique_scores T1485 Data Destruction
aws_cloudendure_disaster_recovery AWS CloudEndure Disaster Recovery technique_scores T1485 Data Destruction
aws_security_hub AWS Security Hub technique_scores T1485 Data Destruction