Skip to content

T1529 System Shutdown/Reboot

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via Network Device CLI (e.g. reload).52 They may also include shutdown/reboot of a virtual machine via hypervisor / cloud consoles or command line tools.

Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery.

Adversaries may also use Windows API functions, such as InitializeSystemShutdownExW or ExitWindowsEx, to force a system to shut down or reboot.97 Alternatively, the NtRaiseHardErroror ZwRaiseHardError Windows API functions with the ResponseOption parameter set to OptionShutdownSystem may deliver a “blue screen of death” (BSOD) to a system.863 In order to leverage these API functions, an adversary may need to acquire SeShutdownPrivilege (e.g., via Access Token Manipulation).7 In some cases, the system may not be able to boot again.

Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as Disk Structure Wipe or Inhibit System Recovery, to hasten the intended effects on system availability.14

Item Value
ID T1529
Sub-techniques
Tactics TA0040
Platforms ESXi, Linux, Network Devices, Windows, macOS
Version 1.5
Created 04 October 2019
Last Modified 24 October 2025

Procedure Examples

ID Name Description
S1167 AcidPour AcidPour includes functionality to reboot the victim system following wiping actions, similar to AcidRain.13
S1125 AcidRain AcidRain reboots the target system once the various wiping processes are complete.10
S1133 Apostle Apostle reboots the victim machine following wiping and related activity.18
G0067 APT37 APT37 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.33
G0082 APT38 APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim’s MBR.32
S1053 AvosLocker AvosLocker’s Linux variant has terminated ESXi virtual machines.31
S1136 BFG Agonizer BFG Agonizer uses elevated privileges to call NtRaiseHardError to induce a “blue screen of death” on infected systems, causing a system crash. Once shut down, the system is no longer bootable.7
S1070 Black Basta Black Basta has used ShellExecuteA to shut down and restart the victim system.28
S1149 CHIMNEYSWEEP CHIMNEYSWEEP can reboot or shutdown the targeted system or logoff the current user.24
S1111 DarkGate DarkGate has used the shutdowncommand to shut down and/or restart the victim system.27
S1033 DCSrv DCSrv has a function to sleep for two hours before rebooting the system.11
S0697 HermeticWiper HermeticWiper can initiate a system shutdown.2930
S0607 KillDisk KillDisk attempts to reboot the machine by terminating specific processes.20
S1160 Latrodectus
Latrodectus has the ability to restart compromised hosts.23
G0032 Lazarus Group Lazarus Group has rebooted systems after destroying files and wiping the MBR on infected systems.34
S0372 LockerGoga LockerGoga has been observed shutting down infected systems.14
S0582 LookBack LookBack can shutdown and reboot the victim machine.17
S0449 Maze Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.16
G1051 Medusa Group Medusa Group has manually turned off and encrypted virtual machines.35
S1135 MultiLayer Wiper MultiLayer Wiper reboots the infected system following wiping and related tasks to prevent system recovery.7
S0368 NotPetya NotPetya will reboot the system one hour after infection.115
S0365 Olympic Destroyer Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.415
S1242 Qilin Qilin can initiate a reboot of the backup server to hinder recovery.12
S0140 Shamoon Shamoon will reboot the infected system once the wiping functionality has been completed.2526
S1178 ShrinkLocker ShrinkLocker can restart the victim system if it encounters an error during execution, and will forcibly shutdown the system following encryption to lock out victim users.22
S0689 WhisperGate WhisperGate can shutdown a compromised host through execution of ExitWindowsEx with the EXW_SHUTDOWN flag.19
S1207 XLoader XLoader can initiate a system reboot or shutdown.21

References


  1. Chiu, A. (2016, June 27). New Ransomware Variant “Nyetya” Compromises Systems Worldwide. Retrieved March 26, 2019. 

  2. CISA. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved February 14, 2022. 

  3. lzcapp. (n.d.). Retrieved September 22, 2025. 

  4. Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019. 

  5. Microsoft. (2017, October 15). Shutdown. Retrieved October 4, 2019. 

  6. NtDoc. (n.d.). NtRaiseHardError - NtDoc. Retrieved September 22, 2025. 

  7. Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024. 

  8. SecurityNews. (2024, July 12). Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant. Retrieved September 22, 2025. 

  9. William Thomas, Adrian Liviu Arsene, Farid Hendi. (2022, February 25). CrowdStrike Falcon® Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved September 22, 2025. 

  10. Juan Andres Guerrero-Saade and Max van Amerongen, SentinelOne. (2022, March 31). AcidRain | A Modem Wiper Rains Down on Europe. Retrieved March 25, 2024. 

  11. Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022. 

  12. Hacioglu, S. (2025, March 10). Qilin Ransomware: Exposing the TTPs Behind One of the Most Active Ransomware Campaigns of 2024. Retrieved September 26, 2025. 

  13. Juan Andrés Guerrero-Saade & Tom Hegel. (2024, March 21). AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine. Retrieved November 25, 2024. 

  14. Greenberg, A. (2019, March 25). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved July 17, 2019. 

  15. Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020. 

  16. Brandt, A., Mackenzie, P.. (2020, September 17). Maze Attackers Adopt Ragnar Locker Virtual Machine Technique. Retrieved October 9, 2020. 

  17. Raggi, M. Schwarz, D.. (2019, August 1). LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards. Retrieved February 25, 2021. 

  18. Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024. 

  19. Biasini, N. et al.. (2022, January 21). Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation. Retrieved March 14, 2022. 

  20. Gilbert Sison, Rheniel Ramos, Jay Yaneza, Alfredo Oliveira. (2018, January 15). KillDisk Variant Hits Latin American Financial Groups. Retrieved January 12, 2021. 

  21. Nart Villeneuve, Randi Eitzman, Sandor Nemes & Tyler Dean, Google Cloud. (2017, October 5). Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea. Retrieved March 11, 2025. 

  22. Cristian Souza, Eduardo Ovalle, Ashley Muñoz, & Christopher Zachor. (2024, May 23). ShrinkLocker: Turning BitLocker into ransomware. Retrieved December 7, 2024. 

  23. Stepanic, D. and Bousseaden, S. (2024, May 15). Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID. Retrieved September 13, 2024. 

  24. Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024. 

  25. Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019. 

  26. Mundo, A., Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 14). Shamoon Returns to Wipe Systems in Middle East, Europe . Retrieved May 29, 2020. 

  27. McGraw, T. (2024, December 4). Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware. Retrieved December 9, 2024. 

  28. Gonzalez, I., Chavez I., et al. (2022, May 9). Examining the Black Basta Ransomware’s Infection Routine. Retrieved March 7, 2023. 

  29. Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022. 

  30. Dani, M. (2022, March 1). Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware. Retrieved March 25, 2022. 

  31. Trend Micro Research. (2022, April 4). Ransomware Spotlight AvosLocker. Retrieved January 11, 2023. 

  32. FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024. 

  33. Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018. 

  34. US-CERT. (2018, March 09). Malware Analysis Report (MAR) - 10135536.11.WHITE. Retrieved June 13, 2018. 

  35. Cybersecurity and Infrastructure Security Agency. (2025, March 12). AA25-071A #StopRansomware: Medusa Ransomware. Retrieved October 15, 2025.