Data Destruction
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018)(Citation: Ta...
BY SOURCE
PROCEDURES (33)
Auto-extracted: 21 detections for general monitoring
Auto-extracted: 6 detections for api
Auto-extracted: 6 detections for event log
Auto-extracted: 5 detections for azure
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 4 detections for email
Auto-extracted: 4 detections for aws
Auto-extracted: 4 detections for cloud monitoring
Auto-extracted: 3 detections for unusual
Auto-extracted: 3 detections for remote
Auto-extracted: 2 detections for registry
Auto-extracted: 2 detections for encrypt
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for kubernetes
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for kubernetes
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for exfiltrat