T1518.002 - Backup Software Discovery

Sub-technique
Tactics:
Discovery
Platforms:
Windows macOS Linux
Detection:
Not specified
Description:
Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486).

Commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), `reg query` with [Reg](https://attack.mitre.org/software/S0075), `dir` with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for, such as Veeam, Acronis, Dropbox, or Paragon.(Citation: Symantec Play Ransomware 2023)
Used by Actors (1)
Metadata
MITRE ID: T1518.002
STIX ID: attack-pattern--4a6cfdae-1417-...
Platforms: Windows, macOS, Linux
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00