Skip to content

T0872 Indicator Removal on Host

Adversaries may attempt to remove indicators of their presence on a system in an effort to cover their tracks. In cases where an adversary may feel detection is imminent, they may try to overwrite, delete, or cover up changes they have made to the device.

Item Value
ID T0872
Sub-techniques
Tactics TA0103
Platforms None
Version 1.0
Created 21 May 2020
Last Modified 25 April 2025

Procedure Examples

ID Name Description
S0607 KillDisk KillDisk deletes application, security, setup, and system event logs from Windows systems. 4
S1009 Triton Triton would reset the controller to the previous state over TriStation and if this failed it would write a dummy program to memory in what was likely an attempt at anti-forensics. 3
C0030 Triton Safety Instrumented System Attack In the Triton Safety Instrumented System Attack, TEMP.Veles would programmatically return the controller to a normal running state if the Triton malware failed. If the controller could not recover in a defined time window, TEMP.Veles programmatically overwrote their malicious program with invalid data.5

Mitigations

ID Mitigation Description
M0922 Restrict File and Directory Permissions Protect files stored locally with proper permissions to limit opportunities for adversaries to remove indicators of their activity on the system. 1 2

References