Data Destruction (T1662)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Data Destruction

Associated Tactics

  • Impact

Impact (TA0034)

The adversary is trying to manipulate, interrupt, or destroy your devices and data. The impact tactic consists of techniques used by the adversary to execute his or her mission objectives but that do not cleanly fit into another category such as Collection. Mission objectives vary based on each adversary's goals, but examples include toll fraud, destruction of device data, or locking the user out of his or her device until a ransom is paid.

View on ATT&CK

Procedure Examples

Description Source(s)
Hu, W., et al. (2015, December 4). Rootnik Android Trojan Abuses Commercial Rooting Tool and Steals Private Information. Retrieved September 26, 2023. rootnik_rooting_tool
Surana, N., et al. (2022, September 8). How Malicious Actors Abuse Native Linux Tools in Attacks. Retrieved September 26, 2023. abuse_native_linux_tools