Esc
File Deletion - T1070.004
(ATT&CK® Technique)
Definition
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.