Esc
There are no artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND.
Backup Software Discovery - T1518.002
(ATT&CK® Technique)
Definition
Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as Data Destruction, Inhibit System Recovery, or Data Encrypted for Impact.
D3FEND Inferred Relationships
There are no artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND.