Query Details
# (Mass) Cloud Resource Deletion ## Query Information #### MITRE ATT&CK Technique(s) | Technique ID | Title | Link | | --- | --- | --- | | T1485 | Data Destruction | https://attack.mitre.org/techniques/T1485/ | #### Description This query can be used to detect (mass) resource deletion in your cloud environment. The query uses the *Threshold* and *BinSize* variables to trigger. The default is set to the deletion of 20 cloud resources in a timespan of 1 day, you can modify this to your needs. #### Risk An actor deletes multiple cloud resources to create impact. #### References - https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-cloudauditevents-table ## Defender For Endpoint ```KQL let Threshold = 20; let BinSize = 1d; CloudAuditEvents | where ActionType == "CloudAuditEventDelete" | summarize TotalActions = count(), arg_max(Timestamp, *) by bin(Timestamp, BinSize), Account, DataSource | where TotalActions > Threshold ```
This query helps detect when a large number of cloud resources are deleted in a short period of time. It looks for instances where 20 or more resources are deleted within a day. This could indicate a malicious actor trying to cause damage.

Bert-Jan Pals
Released: June 21, 2024
Tables
Keywords
Operators