<noframes id="vfxvr">

    <track id="vfxvr"></track>

      <span id="vfxvr"></span>

          ATT&CK-CN V1.01 Last Update: 2019-11 [返回索引頁]

          譯者: 林妙倩(清華大學網絡研究院網絡空間安全實習生)、戴亦侖(賽寧網安) 原創翻譯作品,如果需要轉載請取得翻譯作者同意。

          數據來源:ATT&CK Matrices

          原文: https://attack.mitre.org/techniques/T1488

          術語表: /attack/glossary

          磁盤內容擦除

          攻擊者可能會擦除特定系統以及網絡中大量系統上存儲設備的內容,從而中斷系統和網絡資源的可用性。

          攻擊者可能會部分或完全覆蓋存儲設備的內容,從而使數據無法通過存儲接口恢復。具有破壞性意圖的對手可能會擦除磁盤內容的任意部分,而不是擦除特定的磁盤結構或文件。為了擦除磁盤內容,攻擊者可以直接訪問硬盤驅動器,以便用隨機數據覆蓋磁盤大小任意的部分。已經觀察到對手利用RawDrive等第三方驅動程序直接訪問磁盤內容。[1] [2]此行為與數據銷毀不同,因為磁盤的某些部分而不是單個文件被擦除了。

          為了在以網絡范圍的可用性中斷為目標的運營中最大限度地提高對目標組織的影響,用于擦除磁盤內容的惡意軟件可能具有蠕蟲般的功能,可以利用有效帳戶,憑據轉儲和Windows Admin等其他技術在網絡上傳播。股份。

          Disk Content Wipe

          Adversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a network to interrupt availability to system and network resources.

          Adversaries may partially or completely overwrite the contents of a storage device rendering the data irrecoverable through the storage interface. Instead of wiping specific disk structures or files, adversaries with destructive intent may wipe arbitrary portions of disk content. To wipe disk content, adversaries may acquire direct access to the hard drive in order to overwrite arbitrarily sized portions of disk with random data. Adversaries have been observed leveraging third-party drivers like RawDisk to directly access disk content. This behavior is distinct from Data Destruction because sections of the disk erased instead of individual files.

          To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware used for wiping disk content may have worm-like features to propagate across a network by leveraging additional techniques like Valid Accounts, Credential Dumping, and Windows Admin Shares

          標簽

          編號: T1488

          策略: 影響

          平臺: Linux,macOS,Windows

          所需權限:user,administrator,root,SYSTEM

          數據源: 內核驅動程序,進程監視,進程命令行參數

          影響類型: 可用性

          緩解措施

          減輕 描述
          數據備份 考慮實施IT災難恢復計劃,其中包含用于進行可用于還原組織數據的常規數據備份的過程。確保備份存儲在系統之外,并且免受攻擊者可能用來獲取訪問權限并破壞備份以防止恢復的常見方法的攻擊。
          Mitigation Description
          Data Backup Consider implementing IT disaster recovery plans that contain procedures for taking regular data backups that can be used to restore organizational data. Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.

          檢測

          尋找嘗試讀取/寫入敏感位置(例如分區引導扇區或BIOS參數塊/超級塊)的嘗試。監視異常的內核驅動程序安裝活動。

          Look for attempts to read/write to sensitive locations like the partition boot sector or BIOS parameter block/superblock. Monitor for unusual kernel driver installation activity.

          欧美日韩国产亚洲,天天射影院,大芭蕉天天视频在线观看,欧美肥老太牲交大片,奇米色888,黄三级高清在线播放,国产卡一卡二卡三卡四,亚洲第一黄色视频 日韩中文字幕中文有码,日本A级作爱片一,奇米第四,三级片短片视频免费在线观看,奇米网狠狠网,影音先锋色AV男人资源网,日本丰满熟妇hd 日本日韩中文字幕无区码,涩 色 爱 性,天天射影视,中文字幕制服丝袜第57页,777米奇影院奇米网狠狠,尤物TV国产精品看片在线,欧洲女同牲恋牲交视频 久久AV天堂日日综合,亚洲性爱影院色yeye,日韩亚洲欧美Av精品,十八禁全身裸露全彩漫画,奇米网影视,人人爽人人澡人人人妻,动漫AV专区,天天色综合影院 日韩精品中文字幕,特级无码毛片免费视频,人妻少妇不卡无码视频,制服丝袜有码中文字幕在线,深爱激动情网婷婷,影音先锋全部色先锋,香港三级日本三级韩级人妇 日韩欧美亚洲综合久久在线视频,2021XX性影院,玖玖资源站最稳定网址,日韩亚洲制服丝袜中文字幕,国产超碰人人模人人爽人人喊,先锋色熟女丝袜资源 很黄特别刺激又免费的视频,2021一本久道在线线观看,色中娱乐黄色大片,日本高清不卡在线观看播放,97国产自在现线免费视频,国产在线精品亚洲第一区 免费中文字幕精品一区二区 视频,狠狠爱俺也色,天天好逼网,日韩制服丝袜,国产女人大象蕉视频在线观看,国产 精品 自在 线免费,午夜时刻在线观看