EXPLORE
← Back to Explore
T1578.003

Delete Cloud Instance

An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. An adversary may also [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and later terminate the instance after achieving their objectives.(Citation: Mandiant M-...

IaaS
1
Detections
1
Sources
2
Threat Actors

BY SOURCE

1sigma

PROCEDURES (1)

Service Monitoring1 detections

Auto-extracted: 1 detections for service monitoring

THREAT ACTORS (2)

DETECTIONS (1)