Adversaries may destroy data and files on specific devices or in large numbers to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.
To achieve data destruction, adversaries may use the pm uninstall command to uninstall packages or the rm command to remove specific files. For example, adversaries may first use pm uninstall to uninstall non-system apps, and then use rm (-f) <file(s)> to delete specific files, further hiding malicious activity.[1][2]
| ID | Name | Description |
|---|---|---|
| S1094 | BRATA | |
| S1185 | LightSpy |
LightSpy has deleted media files and messenger-related files on the device.[4] Additionally, LightSpy has used the AppDelete plugin to remove multiple messaging applications, such as WeChat, QQ, Telegram, Line and Whatsapp.[5] |
| S1241 | RatMilad |
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0671 | Detection of Data Destruction | AN1769 |
The user may view applications with administrator access through the device settings and may also notice if user data is inexplicably missing. |