Discovery

T1518.002: Backup Software Discovery

Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destructi...

T1518.002 · Sub-technique ·3 platforms ·1 groups

Description

Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as Data Destruction, Inhibit System Recovery, or Data Encrypted for Impact.

Commands that can be used to obtain security software information are netsh, reg query with Reg, dir with cmd, and Tasklist, but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for, such as Veeam, Acronis, Dropbox, or Paragon.(Citation: Symantec Play Ransomware 2023)

Platforms

WindowsmacOSLinux

Threat Groups (1)

IDGroupContext
G0102Wizard Spider[Wizard Spider](https://attack.mitre.org/groups/G0102) has utilized the PowerShell script `Get-DataInfo.ps1` to collect installed backup software info...

References

Frequently Asked Questions

What is T1518.002 (Backup Software Discovery)?

T1518.002 is a MITRE ATT&CK technique named 'Backup Software Discovery'. It belongs to the Discovery tactic(s). Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destructi...

How can T1518.002 be detected?

Detection of T1518.002 (Backup Software Discovery) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1518.002?

Follow defense-in-depth principles including network segmentation, least privilege access, security monitoring, and regular patching to reduce the risk of this technique.

Which threat groups use T1518.002?

Known threat groups using T1518.002 include: Wizard Spider.