T1070.009 - Clear Persistence

Sub-technique
Tattiche:
Defense Evasion
Piattaforme:
ESXi Linux Windows macOS
Rilevamento:
Not specified
Description:
Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence of their activity. This may involve various actions, such as removing services, deleting executables, [Modify Registry](https://attack.mitre.org/techniques/T1112), [Plist File Modification](https://attack.mitre.org/techniques/T1647), or other methods of cleanup to prevent defenders from collecting evidence of their persistent presence.(Citation: Cylance Dust Storm) Adversaries may also delete accounts previously created to maintain persistence (i.e. [Create Account](https://attack.mitre.org/techniques/T1136)).(Citation: Talos - Cisco Attack 2022)

In some instances, artifacts of persistence may also be removed once an adversary’s persistence is executed in order to prevent errors with the new instance of the malware.(Citation: NCC Group Team9 June 2020)
Metadata
MITRE ID: T1070.009
STIX ID: attack-pattern--d2c4e5ea-dbdf-...
Piattaforme: ESXi, Linux, Windows, macOS
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00