T1578.001 - Create Snapshot
Sub-technique
Tactics:
Defense Evasion
Defense Evasion
Platforms:
IaaS
IaaS
Detection:
Not specified
Not specified
Description:
An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions that prevent access to existing compute service infrastructure, unlike in [Revert Cloud Instance](https://attack.mitre.org/techniques/T1578/004) where an adversary may revert to a snapshot to evade detection and remove evidence of their presence.
An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002), mount one or more created snapshots to that instance, and then apply a policy that allows the adversary access to the created instance, such as a firewall policy that allows them inbound and outbound SSH access.(Citation: Mandiant M-Trends 2020)
An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002), mount one or more created snapshots to that instance, and then apply a policy that allows the adversary access to the created instance, such as a firewall policy that allows them inbound and outbound SSH access.(Citation: Mandiant M-Trends 2020)
Malware (1)
Metadata
| MITRE ID: | T1578.001 |
| STIX ID: | attack-pattern--ed2e45f9-d338-... |
| Platforms: | IaaS |
| Created: | 13/01/2026 17:48 |
| Updated: | 14/03/2026 16:00 |