Common Information
Type Value
Value
File Deletion - T1070.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint. There are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well.(Citation: Microsoft SDelete July 2016) Examples of built-in [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) functions include <code>del</code> on Windows and <code>rm</code> or <code>unlink</code> on Linux and macOS.
Details Published Attributes CTI Title
Details Website 2025-01-01 11 Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 33 DONOT's Attack On Maritime & Defense Manufacturing
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-12 1115 US-CERT Vulnerability Summary for the Week of November 4, 2024 - RedPacket Security
Details Website 2024-11-12 35 Lock5 (Medusa Ransomware)
Details Website 2024-11-11 2 Critical WPLMS WordPress Theme Vulnerability Puts Websites at Risk of RCE Attacks
Details Website 2024-11-11 39 Kaspersky discovers new Ymir ransomware used together with RustyStealer | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-11 46 «Лаборатория Касперского» обнаружила новый шифровальщик Ymir
Details Website 2024-11-11 47 Ymir: new stealthy ransomware in the wild
Details Website 2024-11-11 47 Kaspersky discovers new Ymir ransomware used together with RustyStealer
Details Website 2024-11-11 14 Path Traversal Vulnerability In WPLMS WordPress Theme Exposes Websites To RCE  - Cyble
Details Website 2024-11-07 63 Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-04 1004 US-CERT Vulnerability Summary for the Week of October 28, 2024 - RedPacket Security
Details Website 2024-11-03 54 Coinminer - Malware Analysis
Details Website 2024-11-03 0 Think Deleted Files Are Gone Forever? Think Again!
Details Website 2024-11-01 62 Weekly Intelligence Report - 01 Nov 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2024-10-30 72 LockBit Threat Group Profiling
Details Website 2024-10-29 19 Ransomware: Kill Security
Details Website 2024-10-28 1185 US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security
Details Website 2024-10-23 76 Embargo ransomware: Rock’n’Rust
Details Website 2024-10-21 945 US-CERT Vulnerability Summary for the Week of October 14, 2024 - RedPacket Security
Details Website 2024-10-18 44 Weekly Intelligence Report - 18 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-15 898 US-CERT Vulnerability Summary for the Week of October 7, 2024 - RedPacket Security