Skip to content

T1679 Selective Exclusion

Adversaries may intentionally exclude certain files, folders, directories, file types, or system components from encryption or tampering during a ransomware or malicious payload execution. Some file extensions that adversaries may avoid encrypting include .dll, .exe, and .lnk.1

Adversaries may perform this behavior to avoid alerting users, to evade detection by security tools and analysts, or, in the case of ransomware, to ensure that the system remains operational enough to deliver the ransom notice.

Exclusions may target files and components whose corruption would cause instability, break core services, or immediately expose the attack. By carefully avoiding these areas, adversaries maintain system responsiveness while minimizing indicators that could trigger alarms or otherwise inhibit achieving their goals.

Item Value
ID T1679
Sub-techniques
Tactics TA0005
Platforms Windows
Version 1.0
Created 25 September 2025
Last Modified 22 October 2025

Procedure Examples

ID Name Description
S1247 Embargo Embargo has avoided encrypting specific files and directories by leveraging a regular expression within the ransomware binary.6
S1245 InvisibleFerret InvisibleFerret has the capability to scan for file names, file extensions, and avoids pre-designated path names and file types.45
S1244 Medusa Ransomware Medusa Ransomware has avoided specified files, file extensions and folders to ensure successful execution of the payload and continued operations of the impacted device.123

References