Skip to content

Latest commit

 

History

History
30 lines (24 loc) · 1.19 KB

data-destruction.md

File metadata and controls

30 lines (24 loc) · 1.19 KB
ID E1485
Objective(s) Impact
Related ATT&CK Technique Data Destruction, Delete Device Data

Data Destruction

Data, system files, or other files are destroyed. Individual files are selected, as opposed to wiping an entire sector.

see ATT&CK: Data Destruction.

Methods

Name ID Description
Delete Application/Software E1485.m03 An application or software is deleted.
Delete Shadow Copies E1485.m04 Deletes shadow drive data, which is related to ransomware.
Empty Recycle Bin E1485.m02 Empties the recycle bin, which can be related to ransomware.

Malware Examples

Name Date Description
Shamoon 2012 A 2018 variant includes a component that erases files and then wipes the master boot record, preventing file recovery.[1]

References

[1] http://www.darkreading.com/attacks-breaches/disk-wiping-shamoon-malware-resurfaces-with-file-erasing-malware-in-tow/d/d-id/1333509