<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Volume Shadow Copy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/volume-shadow-copy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 15:36:55 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/volume-shadow-copy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Volume Shadow Copy Deletion via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2026-05-volume-shadow-copy-deletion/</link><pubDate>Tue, 12 May 2026 15:36:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-volume-shadow-copy-deletion/</guid><description>Detects the use of PowerShell to delete volume shadow copies, a tactic commonly employed by ransomware and other destructive attacks to hinder data recovery efforts.</description><content:encoded><![CDATA[<p>Attackers frequently delete volume shadow copies (VSS) to prevent victims from recovering their data after a ransomware attack or other destructive event. This tactic involves using legitimate system administration tools like PowerShell to remove shadow copies, which are essentially snapshots of data volumes at a specific point in time. This activity is often performed in tandem with ransomware deployment or other destructive actions, making it a critical indicator of potential malicious activity. This rule identifies the use of the Win32_ShadowCopy class and related cmdlets to achieve shadow copy deletion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., via phishing or exploit).</li>
<li>Attacker executes PowerShell with elevated privileges.</li>
<li>PowerShell is used to enumerate shadow copies using <code>Get-WmiObject</code> (gwmi) or <code>Get-CimInstance</code> (gcim) and the <code>Win32_ShadowCopy</code> class.</li>
<li>The attacker filters the shadow copies to be deleted, potentially targeting all available copies.</li>
<li>PowerShell executes the deletion of shadow copies using <code>.Delete()</code>, <code>Remove-WmiObject</code> (rwmi), or <code>Remove-CimInstance</code> (rcim) methods.</li>
<li>The system&rsquo;s recovery options are significantly reduced or eliminated.</li>
<li>Ransomware is deployed, encrypting files.</li>
<li>Victim is unable to restore from shadow copies, increasing the likelihood of paying the ransom.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of volume shadow copies significantly hinders or eliminates data recovery options for victims of ransomware or other destructive attacks. This can lead to substantial data loss, prolonged downtime, and increased financial impact, potentially forcing victims to pay ransoms. Organizations without viable backups may face critical business disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Volume Shadow Copy Deletion via PowerShell</code> to your SIEM to detect this behavior.</li>
<li>Enable Sysmon process creation logging with command line auditing to ensure proper logging of PowerShell activity for the Sigma rule.</li>
<li>Monitor PowerShell execution for commands targeting <code>Win32_ShadowCopy</code> with deletion methods based on the Sigma rule&rsquo;s logic.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing those with unusual parent processes or user contexts as described in the rule&rsquo;s false positive analysis.</li>
<li>Implement strict access controls and monitoring for administrative accounts to limit the ability of attackers to execute PowerShell commands related to shadow copy deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>impact</category><category>windows</category><category>powershell</category><category>volume shadow copy</category><category>ransomware</category></item></channel></rss>