Using Splunk Attack Range to Test and Detect Data Destruction (ATT&CK 1485)

Data destruction is an aggressive attack technique observed in several nation-state campaigns. This technique under MITRE ATT&CK 1485, describes actions of adversaries that may “..destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives”.

Some of the Indicators of compromise of destructive software include:

Data destruction against unprepared enterprises can significantly impact their capacity to continue doing business. Enterprises must be prepared and have back up procedures in place. It is also important to notice that attached backups will be targeted, so attached backups do not qualify as a reliable backup as they are likely to be deleted or modified.

A recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA) indicates the possibility of malicious campaigns against organizations. In this alert, a series of MITRE ATT&CK TTP's are described as pointers for preparation against these possible attacks.

When looking at adversaries it is important to understand their use of TTP's in past campaigns in relation to their current and future objectives. One of the known TTP's from named adversaries has been the use of destructive software with great effectiveness and a significant impact on adversaries.

Based on the history of campaigns of adversaries we decided to address one TTP not mentioned in the advisory but likely to be present. MITRE ATT&CK 1485 is the deliberate destruction of data to impact the targeted organization's business continuity.

In the following steps, we are going to use Splunk Attack Range to reproduce one of the indicators of this technique using the Atomic Red Team MITRE ATT&CK simulation engine.

Replicating Attack Technique

First, we need to build the attack range (cloud/terraform mode) to test our technique against (https://github.com/splunk/attack_range#build-attack-range) with the following commands.

python attack_range.py -m terraform -a build Once the attack range is up and running we can execute various “atomics” for this technique using the atomic red team simulation engine. We are going to simulate MITRE ATT&CK T1485 in this case we chose destructive software since it relates to techniques used by named actors in the aforementioned CISA Alert.

Next, we check to see if the atomic that ran in this test executed successfully. For this example the first atomic runs vssadmin.exe to delete volume shadow copies: Figure shows attack_range MITRE ATT&CK T1485 simulation.

Source* Atomic Red Team

Next, we check if we have any content in the security-content for this technique. There are various ways to do this, the simplest way is by simply searching using keywords by Splunk ES Content Updates App.

Keyword Search via Splunk ES Content Updates App

Another way to search for such content is by visiting the Splunk Security Content Github page.

Search the Github Project

The following is a detection syntax under ransomware story that can be applied to this scenario as it searches for windows processes deleting shadow copies.


Using the endpoint data model and looking for the related processes, we can try this search in the Splunk instance along with the attack range. The next graph shows the successful detection of Data Destruction MITRE ATT&CK T1485.

Once successful detection is performed, Playbooks from Splunk Phantom can be used to further investigate and successfully contain this type of attack.

Phantom playbook example: Ransomware Investigate and Contain

To learn how to build your own Splunk Attack Range and simulate your own attack’s to test your detections visit the Attack Range Github page.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.