Skip to content

Latest commit

 

History

History
70 lines (54 loc) · 2.56 KB

data-destruction.md

File metadata and controls

70 lines (54 loc) · 2.56 KB
ID E1485
Objective(s) Impact
Related ATT&CK Techniques Data Destruction (T1485)
Impact Type Availability
Version 2.0
Created 1 August 2019
Last Modified 21 November 2022

Data Destruction

Data, system files, or other files are destroyed. Individual files are selected, as opposed to wiping an entire sector.

See ATT&CK: Data Destruction (T1485).

Methods

Name ID Description
Delete Application/Software E1485.m03 An application or software is deleted.
Delete Shadow Copies E1485.m04 Deletes shadow drive data, which is related to ransomware.
Empty Recycle Bin E1485.m02 Empties the recycle bin, which can be related to ransomware.

Use in Malware

Name Date Method Description
Shamoon 2012 -- A 2018 variant includes a component that erases files and then wipes the master boot record, preventing file recovery. [1]
Rombertik 2015 -- If a specific anti-analysis check fails, the malware will overwrite the Master Boot Record or the User's home folder [2]
BlackEnergy 2007 -- BlackEnergy 2 variant contains a Destroy plugin that destroys data stored on victim hard drives by overwriting file contents [3]
Conficker 2008 -- Resets system restore points and deletes backup files [4]
MazarBot 2016 -- Can erase phone data [5]

References

[1] http://www.darkreading.com/attacks-breaches/disk-wiping-shamoon-malware-resurfaces-with-file-erasing-malware-in-tow/d/d-id/1333509

[2] https://blogs.cisco.com/security/talos/rombertik

[3] https://securelist.com/be2-extraordinary-plugins-siemens-targeting-dev-fails/68838/

[4] https://en.wikipedia.org/wiki/Conficker

[5] https://heimdalsecurity.com/blog/security-alert-mazar-bot-active-attacks-android-malware/

[6] https://www.darkreading.com/attacks-breaches/disk-wiping-shamoon-malware-resurfaces-with-file-erasing-malware-in-tow