Skip to content

T1662 Data Destruction

Adversaries may destroy data and files on specific devices or in large numbers to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.

To achieve data destruction, adversaries may use the pm uninstall command to uninstall packages or the rm command to remove specific files. For example, adversaries may first use pm uninstall to uninstall non-system apps, and then use rm (-f) <file(s)> to delete specific files, further hiding malicious activity.12

Item Value
ID T1662
Sub-techniques
Tactics TA0034
Platforms Android
Version 1.0
Created 22 September 2023
Last Modified 27 September 2023

Procedure Examples

ID Name Description
S1094 BRATA BRATA can perform a factory reset.3
S1185 LightSpy LightSpy has deleted media files and messenger-related files on the device.6 Additionally, LightSpy has used the AppDelete plugin to remove multiple messaging applications, such as WeChat, QQ, Telegram, Line and Whatsapp.5
S1241 RatMilad RatMilad has deleted files on the device.4

Mitigations

ID Mitigation Description
M1011 User Guidance Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups.

References