Indicator Removal
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence.
Description
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Remote Data StorageRestrict File and Directory Permissions
Quick Info
- Technique ID
- T1070
- Tactic
- Defense Evasion
- Sub-Techniques
- 10
- Mitigations
- 2
