Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.[1][2][3][4][5][6] Common operating system file deletion commands such as del
and rm
often only remove pointers to files without wiping the contents of the files themselves, making the files recoverable by proper forensic methodology. This behavior is distinct from Disk Content Wipe and Disk Structure Wipe because individual files are destroyed rather than sections of a storage disk or the disk's logical structure.
Adversaries may attempt to overwrite files and directories with randomly generated data to make it irrecoverable.[4][5] In some cases politically oriented image files have been used to overwrite data.[2][3][4]
To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware designed for destroying data may have worm-like features to propagate across a network by leveraging additional techniques like Valid Accounts, OS Credential Dumping, and SMB/Windows Admin Shares.[1][2][3][4][6].
In cloud environments, adversaries may leverage access to delete cloud storage objects, machine images, database instances, and other infrastructure crucial to operations to damage an organization or their customers.[7][8]
ID | Name | Description |
---|---|---|
C0034 | 2022 Ukraine Electric Power Attack |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed CaddyWiper on the victim’s IT environment systems to wipe files related to the OT capabilities, along with mapped drives, and physical drive partitions.[9] |
S1125 | AcidRain |
AcidRain performs an in-depth wipe of the target filesystem and various attached storage devices through either a data overwrite or calling various IOCTLS to erase it.[10] |
S1133 | Apostle |
Apostle initially masqueraded as ransomware but actual functionality is a data destruction tool, supported by an internal name linked to an early version, |
G0082 | APT38 |
APT38 has used a custom secure delete function to make deleted files unrecoverable.[12] |
S0089 | BlackEnergy |
BlackEnergy 2 contains a "Destroy" plug-in that destroys data stored on victim hard drives by overwriting file contents.[13][14] |
S0693 | CaddyWiper |
CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.[15][16] |
S1134 | DEADWOOD |
DEADWOOD overwrites files on victim systems with random data to effectively destroy them.[11] |
S0659 | Diavol |
Diavol can delete specified files from a targeted system.[17] |
S0697 | HermeticWiper |
HermeticWiper can recursively wipe folders and files in |
S0604 | Industroyer |
Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.[19] |
S0265 | Kazuar |
Kazuar can overwrite files with random data before deleting them.[20] |
S0607 | KillDisk |
KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.[21] |
G1004 | LAPSUS$ |
LAPSUS$ has deleted the target's systems and resources both on-premises and in the cloud.[22][23] |
G0032 | Lazarus Group |
Lazarus Group has used a custom secure delete function to overwrite file contents with data from heap memory.[24] |
S0688 | Meteor |
Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.[25] |
S1135 | MultiLayer Wiper |
MultiLayer Wiper deletes files on network drives, but corrupts and overwrites with random data files stored locally.[26] |
S0365 | Olympic Destroyer |
Olympic Destroyer overwrites files locally and on remote shares.[6][27] |
S0139 | PowerDuke |
PowerDuke has a command to write random data across a file and delete it.[28] |
S0238 | Proxysvc |
Proxysvc can overwrite files indicated by the attacker before deleting them.[29] |
S0364 | RawDisk |
RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.[3][5] |
S0496 | REvil |
REvil has the capability to destroy files and folders.[30][31][32][32][33][34][35] |
G0034 | Sandworm Team |
Sandworm Team has used CaddyWiper, SDelete, and the BlackEnergy KillDisk component to overwrite files on victim systems. [36][37][9] Additionally, Sandworm Team has used the JUNKMAIL tool to overwrite files with null bytes.[38] |
S0195 | SDelete |
SDelete deletes data in a way that makes it unrecoverable.[39] |
S0140 | Shamoon |
Shamoon attempts to overwrite operating system files and disk structures with image files.[1][2][3] In a later variant, randomly generated data was used for data overwrites.[5][40] |
S0380 | StoneDrill |
StoneDrill has a disk wiper module that targets files other than those in the Windows directory.[4] |
S0689 | WhisperGate |
WhisperGate can corrupt files by overwriting the first 1 MB with |
S0341 | Xbash |
Xbash has destroyed Linux-based databases as part of its ransomware capabilities.[47] |
ID | Mitigation | Description |
---|---|---|
M1053 | Data Backup |
Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.[48] Ensure backups are stored off system and protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery. |
M1032 | Multi-factor Authentication |
Implement multi-factor authentication (MFA) delete for cloud storage resources, such as AWS S3 buckets, to prevent unauthorized deletion of critical data and infrastructure. MFA delete requires additional authentication steps, making it significantly more difficult for adversaries to destroy data without proper credentials. This additional security layer helps protect against the impact of data destruction in cloud environments by ensuring that only authenticated actions can irreversibly delete storage or machine images. |
M1018 | User Account Management |
In cloud environments, limit permissions to modify cloud bucket lifecycle policies (e.g., |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0010 | Cloud Storage | Cloud Storage Deletion |
Monitor for unexpected deletion of a cloud storage infrastructure, such as the |
Cloud Storage Modification |
Monitor for unexpected use of lifecycle policies. Where lifecycle policies are already in use, monitor for changes to cloud storage configurations and policies, such as buckets configured in the policy or unusually short retention periods. In AWS environments, monitor for |
||
DS0017 | Command | Command Execution |
Monitor executed commands and arguments for binaries that could be involved in data destruction activity, such as SDelete. |
DS0022 | File | File Deletion |
Monitor for unexpected deletion to a file (ex: Sysmon EID 23) |
File Modification |
Monitor for changes made to a large quantity of files for unexpected modifications in user directories and under C:\Windows\System32. |
||
DS0007 | Image | Image Deletion |
Monitor for unexpected deletion of a virtual machine image (ex: Azure Compute Service Images |
DS0030 | Instance | Instance Deletion |
Monitor for unexpected deletion of a virtual machine or database instance (ex: |
DS0009 | Process | Process Creation |
Monitor for newly executed processes of binaries that could be involved in data destruction activity, such as SDelete. |
DS0020 | Snapshot | Snapshot Deletion |
Monitor for unexpected deletion of a snapshot (ex: AWS |
DS0034 | Volume | Volume Deletion |
Monitor for unexpected deletion of a cloud volume (ex: AWS |