Remotely Wipe Data Without Authorization (T1469)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Remotely Wipe Data Without Authorization

Associated Tactics

  • Remote Service Effects

Remote Service Effects (TA0039)

The adversary is trying to control or monitor the device using remote services. This category refers to techniques involving remote services, such as vendor-provided cloud services (e.g. Google Drive, Google Find My Device, or Apple iCloud), or enterprise mobility management (EMM)/mobile device management (MDM) services that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself.

View on ATT&CK

Procedure Examples

Description Source(s)
Mat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016. Honan-Hacking
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue