<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Indicator-Removal — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/indicator-removal/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 14:12:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/indicator-removal/feed.xml" rel="self" type="application/rss+xml"/><item><title>WebServer Access Logs Deleted</title><link>https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</link><pubDate>Wed, 01 Apr 2026 14:12:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</guid><description>Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.</description><content:encoded><![CDATA[<p>This rule detects the deletion of web server access logs, a common tactic used by attackers to cover their tracks and hinder forensic investigations. The deletion of these logs may indicate an attempt to evade detection or destroy forensic evidence on a system. This detection rule focuses on identifying deletion events in directories commonly used for web server logs, such as those used by Apache and IIS. The rule covers multiple operating systems, providing a broad detection capability. This is important for defenders because web server logs are critical for monitoring web traffic and identifying malicious activity. The rule is designed to detect activity on &ldquo;auditbeat-<em>&rdquo;, &ldquo;winlogbeat-</em>&rdquo;, &ldquo;logs-endpoint.events.<em>&rdquo;, &ldquo;logs-windows.sysmon_operational-</em>&rdquo; indices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a system hosting a web server, potentially through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker identifies the location of the web server&rsquo;s access logs. Common locations include <code>/var/log/apache*/access.log</code> and <code>C:\\inetpub\\logs\\LogFiles\\*.log</code>.</li>
<li>The attacker uses a privileged account or escalates privileges to obtain the necessary permissions to delete the log files.</li>
<li>The attacker executes a command to delete the web server access logs. This could be done using <code>rm</code> on Linux or <code>del</code> on Windows.</li>
<li>The operating system records the file deletion event in its audit logs, which are monitored by security tools.</li>
<li>The detection rule identifies the deletion event based on the file path and event type.</li>
<li>The security team is alerted to the potential intrusion and begins investigating the incident.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of web server access logs can significantly impede incident response and forensic investigations. Without these logs, it becomes difficult to determine the scope and impact of an attack, including identifying compromised accounts, exploited vulnerabilities, and stolen data. This can lead to delayed or ineffective remediation efforts, potentially resulting in further damage to the organization. The impact is particularly severe if the logs are deleted before suspicious activity is detected, as it removes valuable evidence needed for analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WebServer Access Logs Deleted</code> to your SIEM and tune for your environment to detect malicious log deletion attempts.</li>
<li>Enable file integrity monitoring (FIM) on web server log directories to detect unauthorized modifications or deletions.</li>
<li>Review and tighten access controls on web server log files to ensure only authorized personnel can modify or delete them.</li>
<li>Implement a robust log backup and retention policy to ensure that logs are available for forensic analysis even if they are deleted from the primary system.</li>
<li>Investigate any alerts generated by the <code>WebServer Access Logs Deleted</code> rule promptly to determine the root cause and extent of the compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>indicator-removal</category><category>file-deletion</category></item></channel></rss>