T1529 System Shutdown/Reboot
Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via Network Device CLI (e.g. reload
).42
Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery.
Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as Disk Structure Wipe or Inhibit System Recovery, to hasten the intended effects on system availability.13
Item | Value |
---|---|
ID | T1529 |
Sub-techniques | |
Tactics | TA0040 |
Platforms | Linux, Network, Windows, macOS |
Version | 1.3 |
Created | 04 October 2019 |
Last Modified | 22 March 2023 |
Procedure Examples
ID | Name | Description |
---|---|---|
G0067 | APT37 | APT37 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.17 |
G0082 | APT38 | APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim’s MBR.18 |
S1053 | AvosLocker | AvosLocker’s Linux variant has terminated ESXi virtual machines.12 |
S1033 | DCSrv | DCSrv has a function to sleep for two hours before rebooting the system.9 |
S0697 | HermeticWiper | HermeticWiper can initiate a system shutdown.78 |
S0607 | KillDisk | KillDisk attempts to reboot the machine by terminating specific processes.11 |
G0032 | Lazarus Group | Lazarus Group has rebooted systems after destroying files and wiping the MBR on infected systems.19 |
S0372 | LockerGoga | LockerGoga has been observed shutting down infected systems.13 |
S0582 | LookBack | LookBack can shutdown and reboot the victim machine.16 |
S0449 | Maze | Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.10 |
S0368 | NotPetya | NotPetya will reboot the system one hour after infection.16 |
S0365 | Olympic Destroyer | Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.36 |
S0140 | Shamoon | Shamoon will reboot the infected system once the wiping functionality has been completed.1415 |
S0689 | WhisperGate | WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag.5 |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0009 | Process | Process Creation |
DS0013 | Sensor Health | Host Status |
References
-
Chiu, A. (2016, June 27). New Ransomware Variant “Nyetya” Compromises Systems Worldwide. Retrieved March 26, 2019. ↩↩
-
CISA. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved February 14, 2022. ↩
-
Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019. ↩↩
-
Microsoft. (2017, October 15). Shutdown. Retrieved October 4, 2019. ↩
-
Biasini, N. et al.. (2022, January 21). Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation. Retrieved March 14, 2022. ↩
-
Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020. ↩↩
-
Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022. ↩
-
Dani, M. (2022, March 1). Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware. Retrieved March 25, 2022. ↩
-
Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022. ↩
-
Brandt, A., Mackenzie, P.. (2020, September 17). Maze Attackers Adopt Ragnar Locker Virtual Machine Technique. Retrieved October 9, 2020. ↩
-
Gilbert Sison, Rheniel Ramos, Jay Yaneza, Alfredo Oliveira. (2018, January 15). KillDisk Variant Hits Latin American Financial Groups. Retrieved January 12, 2021. ↩
-
Trend Micro Research. (2022, April 4). Ransomware Spotlight AvosLocker. Retrieved January 11, 2023. ↩
-
Greenberg, A. (2019, March 25). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved July 17, 2019. ↩
-
Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019. ↩
-
Mundo, A., Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 14). Shamoon Returns to Wipe Systems in Middle East, Europe . Retrieved May 29, 2020. ↩
-
Raggi, M. Schwarz, D.. (2019, August 1). LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards. Retrieved February 25, 2021. ↩
-
Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018. ↩
-
FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018. ↩
-
US-CERT. (2018, March 09). Malware Analysis Report (MAR) - 10135536.11.WHITE. Retrieved June 13, 2018. ↩