| ID | Name |
|---|---|
| T1491.001 | Internal Defacement |
| T1491.002 | External Defacement |
An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users, thus discrediting the integrity of the systems. This may take the form of modifications to internal websites or server login messages, or directly to user systems with the replacement of the desktop wallpaper.[1][2] Disturbing or offensive images may be used as a part of Internal Defacement in order to cause user discomfort, or to pressure compliance with accompanying messages. Since internally defacing systems exposes an adversary's presence, it often takes place after other intrusion goals have been accomplished.[3]
| ID | Name | Description |
|---|---|---|
| S1070 | Black Basta |
Black Basta has set the desktop wallpaper on victims' machines to display a ransom note.[4][5][6][7][8][9][10][11][12] |
| G1043 | BlackByte |
BlackByte left ransom notes in all directories where encryption takes place.[13] |
| S1068 | BlackCat |
BlackCat can change the desktop wallpaper on compromised hosts.[14][15] |
| S0659 | Diavol |
After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text "All your files are encrypted! For more information see "README-FOR-DECRYPT.txt".[16] |
| G0047 | Gamaredon Group |
Gamaredon Group has left taunting images and messages on the victims' desktops as proof of system access.[17] |
| S1139 | INC Ransomware |
INC Ransomware has the ability to change the background wallpaper image to display the ransom note.[18][19] |
| G0032 | Lazarus Group |
Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe.[3] |
| S0688 | Meteor |
Meteor can change both the desktop wallpaper and the lock screen image to a custom image.[20] |
| S1242 | Qilin |
Qilin can set the wallpaper on compromised hosts to display a ransom message.[21] |
| S1212 | RansomHub |
RansomHub has placed a ransom note on comrpomised systems to warn victims and provide directions for how to retrieve data.[22] |
| S1150 | ROADSWEEP |
ROADSWEEP has dropped ransom notes in targeted folders prior to encrypting the files.[23] |
| S1178 | ShrinkLocker |
ShrinkLocker renames disk labels on victim hosts to the threat actor's email address to enable the victim to contact the threat actor for ransom negotiation.[24][25] |
| ID | Mitigation | Description |
|---|---|---|
| M1053 | Data Backup |
Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data.[26] Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0082 | Internal Website and System Content Defacement via UI or Messaging Modifications | AN0229 |
Adversary modifies internal UI messages (e.g., login banners, desktop wallpapers) or hosted intranet web pages by creating or altering content files using scripts or unauthorized access. Often preceded by privilege escalation or web shell deployment. |
| AN0230 |
Adversary leverages root or sudo access to alter system banners, web content directories (e.g., /var/www/html), or login configurations (/etc/issue). File creation or overwrites may coincide with suspicious script execution or cron job activity. |
||
| AN0231 |
Modification of user desktop backgrounds, login screen messages, or system banners by adversaries using admin privileges or script execution. May coincide with tampering in /Library/Desktop Pictures/ or use of AppleScript. |
||
| AN0232 |
Adversary modifies ESXi host login banner or MOTD file (/etc/motd), either through SSH or host console access. May involve configuration file overwrite or API calls from compromised vSphere clients. |