

Ĭonsider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data. WannaCry uses vssadmin, wbadmin, bcdedit, and wmic to delete and disable operating system recovery features. Ryuk has used vssadmin Delete Shadows /all /quiet to to delete volume shadow copies and vssadmin resize shadowstorage to force deletion of shadow copies created by third-party applications.


Royal can delete shadow copy backups with vssadmin.exe using the command delete shadows /all /quiet. RobbinHood deletes shadow copies to ensure that all the data cannot be restored easily. REvil can use vssadmin to delete volume shadow copies and bcdedit to disable recovery features. Ragnar Locker can delete volume shadow copies using vssadmin delete shadows /all /quiet. Pysa has the functionality to delete shadow copies. ProLock can use vssadmin.exe to remove volume shadow copies. Prestige can delete the backup catalog from the target system using: c:\Windows\System32\wbadmin.exe delete catalog -quiet and can also delete volume shadow copies using: \Windows\System32\vssadmin.exe delete shadows /all /quiet.
#CISDEM RECOVERY WINDOWS#
Olympic Destroyer uses the native Windows utilities vssadmin, wbadmin, and bcdedit to delete and disable operating system recovery features such as the Windows backup catalog and Windows Automatic Repair. Netwalker can delete the infected system's Shadow Volumes to prevent recovery. Meteor can use bcdedit to delete different boot identifiers on a compromised host it can also use vssadmin.exe delete shadows /all /quiet and C:\\Windows\\system32\\wbem\\wmic.exe shadowcopy delete. MegaCortex has deleted volume shadow copies using vssadmin.exe. Maze has attempted to delete the shadow volumes of infected machines, once before and once after the encryption process. JCry has been observed deleting shadow copies to ensure that data cannot be restored easily. InvisiMole can can remove all system restore points. HermeticWiper can disable the VSS service on a compromised host using the service control manager. HELLOKITTY can delete volume shadow copies on compromised hosts. H1N1 disable recovery options and deletes shadow copies from the victim. įIVEHANDS has the ability to delete volume shadow copies on compromised hosts. ĮKANS removes backups of Volume Shadow Copies to disable any restoration capabilities. ĭiavol can delete shadow copies using the IVssBackupComponents COM object to call the DeleteSnapshots method. ĭEATHRANSOM can delete volume shadow copies on compromised hosts. ĭarkWatchman can delete shadow volumes using vssadmin.exe. Ĭonti can delete Windows Volume Shadow Copies using vssadmin. Ĭonficker resets system restore points and deletes backup files. Ĭlop can delete the shadow volumes with vssadmin Delete Shadows /all /quiet and can use bcdedit to disable recovery options. bcdedit.exe can be used to disable automatic Windows recovery features by modifying boot configuration data - bcdedit.exe /set recoveryenabled No.wbadmin.exe can be used to delete the Windows Backup Catalog - wbadmin.exe delete catalog -quiet.Windows Management Instrumentation can be used to delete volume shadow copies - wmic shadowcopy delete.vssadmin.exe can be used to delete all volume shadow copies on a system - vssadmin.exe delete shadows /all /quiet.Ī number of native Windows utilities have been used by adversaries to disable or delete system recovery features: Furthermore, adversaries may disable recovery notifications, then corrupt backups. Adversaries may disable or delete system recovery features to augment the effects of Data Destruction and Data Encrypted for Impact. Operating systems may contain features that can help fix corrupted systems, such as a backup catalog, volume shadow copies, and automatic repair features. This may deny access to available backups and recovery options. Adversaries may delete or remove built-in data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.
