T1070 - Indicator Removal
Tattiche:
Defense Evasion
Defense Evasion
Piattaforme:
Containers ESXi Linux macOS +3
Containers ESXi Linux macOS +3
Rilevamento:
Not specified
Not specified
Description:
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform.
Removal of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.
Removal of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.
Sub-tecniche (10)
Usato da Attori (4)
Malware (20)
Orz other
Stuxnet other
Sardonic other
Bankshot other
DUSTTRAP other
Neoichor other
BlackEnergy other
Rising Sun other
Flagpro other
DarkWatchman other
MultiLayer Wiper other
EVILNUM other
Metamorfo other
BPFDoor other
SDBbot other
Sibot other
HermeticWiper other
SUNBURST other
IPsec Helper other
FunnyDream other
Metadata
| MITRE ID: | T1070 |
| STIX ID: | attack-pattern--799ace7f-e227-... |
| Piattaforme: | Containers, ESXi, Linux, macOS, Network Devices, Office Suite, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 21/04/2026 16:00 |