Lifecycle-Triggered Deletion (T1485.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Impact

Impact (TA0040)

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View on ATT&CK

Procedure Examples

Description Source(s)
AWS. (n.d.). Managing the lifecycle of objects. Retrieved September 25, 2024. AWS Storage Lifecycles
Google Cloud. (n.d.). Object Lifecycle Management. Retrieved September 25, 2024. GCP Storage Lifecycles
Microsoft Azure. (2024, July 3). Configure a lifecycle management policy. Retrieved September 25, 2024. Azure Storage Lifecycles
Ofir Balassiano and Ofir Shaty. (2023, November 29). Ransomware in the Cloud: Breaking Down the Attack Vectors. Retrieved September 25, 2024. Palo Alto Cloud Ransomware
Stratus Red Team. (n.d.). CloudTrail Logs Impairment Through S3 Lifecycle Rule. Retrieved September 25, 2024. Datadog S3 Lifecycle CloudTrail Logs