<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Backup-Deletion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/backup-deletion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:12:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/backup-deletion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Third-party Backup Files Deleted via Unexpected Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 18:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</guid><description>This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.</description><content:encoded><![CDATA[<p>This rule identifies the deletion of backup files, specifically those created by Veeam and Veritas Backup Exec, through unexpected processes on Windows systems. The rule aims to detect potential attempts to inhibit system recovery by adversaries, particularly in the context of ransomware attacks. Attackers often target backup files to eliminate recovery options for victims. This detection focuses on identifying file deletion events where the process responsible for the deletion does not belong to the trusted backup software suite. The rule excludes known legitimate processes and directories like Trend Micro&rsquo;s, Microsoft Exchange Mailbox Assistants, and the Recycle Bin to minimize false positives. The original Elastic detection rule was created in October 2021 and last updated May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to the target Windows system.</li>
<li>The attacker performs reconnaissance to identify backup file locations.</li>
<li>The attacker uses a non-backup related process (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to delete backup files.</li>
<li>The attacker targets Veeam backup files with extensions <code>VBK</code>, <code>VIB</code>, and <code>VBM</code>.</li>
<li>The attacker targets Veritas Backup Exec files with the <code>BKF</code> extension.</li>
<li>The deletion events are logged by the endpoint detection system.</li>
<li>The detection rule triggers, identifying the anomalous deletion activity based on file extension and process context.</li>
<li>Successful deletion of backups impairs the victim&rsquo;s ability to recover from ransomware or other destructive attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup files can severely impact an organization&rsquo;s ability to recover from a ransomware attack or other data loss events. Without viable backups, the victim organization may be forced to pay a ransom or face significant data loss and business disruption. This tactic directly increases the attacker&rsquo;s leverage and potential financial gain. The rule&rsquo;s documentation cites a report from AdvIntel detailing backup removal solutions seen with Conti ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unexpected Veeam Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veeam backup files.</li>
<li>Deploy the Sigma rule <code>Unexpected Veritas Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veritas Backup Exec files.</li>
<li>Investigate any alerts generated by these rules to determine the source of the deletion and assess potential impact.</li>
<li>Enable endpoint file event logging to capture file deletion events, which are crucial for the Sigma rules.</li>
<li>Review process execution chains (parent process tree) for unknown processes to identify the root cause of unexpected file deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup deletion</category><category>ransomware</category></item><item><title>Windows Backup Deletion via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</guid><description>Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.</description><content:encoded><![CDATA[<p>Attackers, including ransomware groups, often attempt to remove or impair an organization&rsquo;s ability to recover from an attack. One method to achieve this is by deleting Windows backup catalogs and system state backups using the <code>wbadmin.exe</code> utility. Windows Server Backup stores details about backups (what volumes are backed up and where the backups are located) in a backup catalog. Removing these catalogs renders backups unusable for recovery, increasing the impact of the attack. This technique is frequently observed in ransomware playbooks and other destructive attacks targeting Windows environments. This activity can be detected using endpoint detection and response (EDR) solutions, Windows Security Event Logs, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li>The attacker escalates privileges to administrator level to execute wbadmin.exe.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete catalog</code> command to remove backup catalogs.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete systemstatebackup</code> command to remove system state backups.</li>
<li>The attacker may also delete shadow copies using <code>vssadmin.exe</code> or <code>wmic.exe</code> to further hinder recovery.</li>
<li>The attacker deploys ransomware or initiates other destructive actions.</li>
<li>The attacker encrypts or destroys data on the system and connected network shares.</li>
<li>The attacker demands a ransom payment for data recovery, which is complicated by the deleted backups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup catalogs and system state backups significantly impairs an organization&rsquo;s ability to recover from a ransomware attack or other destructive event. This can lead to prolonged downtime, data loss, and financial losses associated with incident response and recovery efforts. While the number of direct victims of this specific technique is difficult to quantify, the impact is typically observed in conjunction with broader ransomware campaigns affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging with Event ID 1 to capture <code>wbadmin.exe</code> executions and activate the first Sigma rule.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor Windows Security Event Logs for process creation events related to <code>wbadmin.exe</code>.</li>
<li>Investigate any instances of <code>wbadmin.exe</code> executing with <code>delete</code> arguments.</li>
<li>Review and harden account access controls to prevent unauthorized use of <code>wbadmin.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup-deletion</category><category>windows</category></item></channel></rss>