KillDisk
MITREOther
Unknown
Unknown
[KillDisk](https://attack.mitre.org/software/S0607) is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of [BlackEnergy](https://attack.mitre.org/software/S0089) malware during cyber attacks against Ukraine in 2015. [KillDisk](https://attack.mitre.org/software/S0607) has since evolved into stand-alone malware used by a variety of threat actors against additional targets in Europe and Latin America; in 2016 a ransomware component was also incorporated into some [KillDisk](https://attack.mitre.org/software/S0607) variants.(Citation: KillDisk Ransomware)(Citation: ESEST Black Energy Jan 2016)(Citation: Trend Micro KillDisk 1)(Citation: Trend Micro KillDisk 2)
Associated Techniques (15)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1027 | Obfuscated Files or Information | - |
| T1036.004 | Masquerade Task or Service | - |
| T1057 | Process Discovery | - |
| T1070.001 | Clear Windows Event Logs | - |
| T1070.004 | File Deletion | - |
| T1083 | File and Directory Discovery | - |
| T1106 | Native API | - |
| T1129 | Shared Modules | - |
| T1134 | Access Token Manipulation | - |
| T1485 | Data Destruction | - |
| T1486 | Data Encrypted for Impact | - |
| T1489 | Service Stop | - |
| T1529 | System Shutdown/Reboot | - |
| T1561.002 | Disk Structure Wipe | - |
| T1680 | Local Storage Discovery | - |
Aliases (525)
Used by Actors (2)
Metadata
| ID: | 620 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |