T1518.002 - Backup Software Discovery

Sub-technique
Tattiche:
Discovery
Piattaforme:
Windows macOS Linux
Rilevamento:
Not specified
Description:
Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486).

Commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), `reg query` with [Reg](https://attack.mitre.org/software/S0075), `dir` with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for, such as Veeam, Acronis, Dropbox, or Paragon.(Citation: Symantec Play Ransomware 2023)
Usato da Attori (1)
Metadata
MITRE ID: T1518.002
STIX ID: attack-pattern--4a6cfdae-1417-...
Piattaforme: Windows, macOS, Linux
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00