MITRE ATT&CK Technique
Defense Evasion T1578.004
Description

An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage snapshots through the cloud management dashboard or cloud APIs. Another variation of this technique is to utilize temporary storage attached to the compute instance. Most cloud providers provide various types of storage including persistent, local, and/or ephemeral, with the ephemeral types often reset upon stop/restart of the VM.(Citation: Tech Republic - Restore AWS Snapshots)(Citation: Google - Restore Cloud Snapshot)

Supported Platforms
IaaS
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-06-16T18:42:20.734Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'An adversary may revert changes made to a cloud instance '
                'after they have performed malicious activities in attempt to '
                'evade detection and remove evidence of their presence. In '
                'highly virtualized environments, such as cloud-based '
                'infrastructure, this may be accomplished by restoring virtual '
                'machine (VM) or data storage snapshots through the cloud '
                'management dashboard or cloud APIs.\n'
                '\n'
                'Another variation of this technique is to utilize temporary '
                'storage attached to the compute instance. Most cloud '
                'providers provide various types of storage including '
                'persistent, local, and/or ephemeral, with the ephemeral types '
                'often reset upon stop/restart of the VM.(Citation: Tech '
                'Republic - Restore AWS Snapshots)(Citation: Google - Restore '
                'Cloud Snapshot)',
 'external_references': [{'external_id': 'T1578.004',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1578/004'},
                         {'description': 'Hardiman, N.. (2012, March 20). '
                                         'Backing up and restoring snapshots '
                                         'on Amazon EC2 machines. Retrieved '
                                         'October 8, 2019.',
                          'source_name': 'Tech Republic - Restore AWS '
                                         'Snapshots',
                          'url': 'https://www.techrepublic.com/blog/the-enterprise-cloud/backing-up-and-restoring-snapshots-on-amazon-ec2-machines/'},
                         {'description': 'Google. (2019, October 7). Restoring '
                                         'and deleting persistent disk '
                                         'snapshots. Retrieved October 8, '
                                         '2019.',
                          'source_name': 'Google - Restore Cloud Snapshot',
                          'url': 'https://cloud.google.com/compute/docs/disks/restore-and-delete-snapshots'}],
 'id': 'attack-pattern--0708ae90-d0eb-4938-9a76-d0fc94f6eec1',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-10-24T17:48:21.210Z',
 'name': 'Revert Cloud Instance',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Netskope'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['IaaS'],
 'x_mitre_version': '1.2'}
Quick Actions