Azure Compute Snapshot Deletion by Unusual User and Resource Group
Identifies when an Azure disk snapshot is deleted by an unusual user in a specific resource group. Snapshots are critical for backup, disaster recovery, and forensic analysis. Adversaries may delete snapshots to prevent data recovery, eliminate forensic evidence, or disrupt backup strategies before executing ransomware or other destructive attacks. Monitoring snapshot deletions is essential for detecting potential attacks targeting backup and recovery capabilities.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2025/10/10"
3integration = ["azure"]
4maturity = "production"
5updated_date = "2025/10/10"
6
7[rule]
8author = ["Elastic"]
9description = """
10Identifies when an Azure disk snapshot is deleted by an unusual user in a specific resource group. Snapshots are
11critical for backup, disaster recovery, and forensic analysis. Adversaries may delete snapshots to prevent data
12recovery, eliminate forensic evidence, or disrupt backup strategies before executing ransomware or other destructive
13attacks. Monitoring snapshot deletions is essential for detecting potential attacks targeting backup and recovery
14capabilities.
15"""
16false_positives = [
17 """
18 Storage administrators may legitimately delete snapshots during routine maintenance, storage optimization, or
19 cleanup of old backup data. Verify that the deletion was expected and follows organizational data retention
20 policies. Consider exceptions for approved maintenance windows or automated retention management tools.
21 """,
22]
23from = "now-9m"
24index = ["logs-azure.activitylogs-*"]
25language = "kuery"
26license = "Elastic License v2"
27name = "Azure Compute Snapshot Deletion by Unusual User and Resource Group"
28note = """## Triage and analysis
29
30### Investigating Azure Compute Snapshot Deletion by Unusual User and Resource Group
31
32Azure disk snapshots provide point-in-time copies of managed disks, serving as critical components for backup strategies, disaster recovery plans, and forensic investigations. Snapshots enable organizations to restore data and reconstruct system states after security incidents. Adversaries aware of backup strategies may delete snapshots to prevent recovery, eliminate forensic evidence, or maximize impact before executing ransomware attacks. This detection monitors for snapshot deletion operations to identify potential attempts to compromise backup and recovery capabilities. This is a New Terms rule that looks for this behavior by a user and resource group that has not been seen in the last 7 days.
33
34### Possible investigation steps
35
36- Review the Azure activity logs to identify the user or service principal that initiated the snapshot deletion by examining the principal ID, UPN and user agent fields.
37- Check the specific snapshot name in `azure.resource.name` to understand which backup was deleted and assess the potential impact on recovery capabilities.
38- Investigate the timing of the event to correlate with any other suspicious activities, such as unusual login patterns, privilege escalation attempts, or other resource deletions.
39- Examine the user's recent activity history to identify any other snapshots, disks, or Azure resources that were deleted or modified by the same principal.
40- Verify if the snapshot deletion aligns with approved change requests, maintenance windows, or data retention policies in your organization.
41- Check if other backup-related resources (backup vaults, recovery services) were accessed or modified around the same time.
42- Review any related alerts or activities such as data encryption, VM modifications, or access policy changes that occurred before the deletion.
43- Investigate if the account was recently compromised by checking for suspicious authentication events or privilege escalations.
44
45### False positive analysis
46
47- Legitimate cleanup of expired snapshots according to data retention policies may trigger this alert. Document approved retention management processes and consider creating exceptions for automated retention tools or scheduled cleanup activities.
48- DevOps automation tools might delete temporary snapshots created during deployment or testing processes. Identify service principals used by CI/CD pipelines and consider time-based exceptions during deployment windows.
49- Storage optimization initiatives may involve deleting old or redundant snapshots to reduce costs. Coordinate with infrastructure teams to understand planned optimization activities and create exceptions during documented maintenance windows.
50- Disaster recovery testing may involve creating and deleting test snapshots. Work with business continuity teams to identify these patterns and create exceptions during scheduled DR testing periods.
51
52### Response and remediation
53
54- Immediately investigate whether the deletion was authorized by verifying with the account owner, backup administrators, or relevant stakeholders.
55- If the deletion was unauthorized, disable the compromised user account or service principal immediately to prevent further damage.
56- Check if the snapshot can be recovered through Azure backup services or soft-delete capabilities if enabled.
57- Create new snapshots of critical disks immediately if the deleted snapshot was part of your backup strategy.
58- Review and audit all Azure RBAC permissions to identify how the attacker gained snapshot deletion capabilities.
59- Conduct a full security assessment to identify the initial access vector and any other compromised accounts or resources.
60- Implement Azure Resource Locks on critical snapshots to prevent accidental or malicious deletion.
61- Configure Azure Policy to restrict snapshot deletion permissions to only authorized backup administrators.
62- Enable Azure Activity Log alerts to notify security teams immediately when snapshots are deleted.
63- Review backup and disaster recovery procedures to ensure redundant backup mechanisms exist beyond Azure snapshots.
64- Document the incident and update security policies and procedures to prevent similar incidents in the future.
65"""
66references = [
67 "https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/",
68]
69risk_score = 21
70rule_id = "c3d4e5f6-7a8b-9c0d-1e2f-3a4b5c6d7e8f"
71severity = "low"
72tags = [
73 "Domain: Cloud",
74 "Domain: Storage",
75 "Data Source: Azure",
76 "Data Source: Azure Activity Logs",
77 "Use Case: Threat Detection",
78 "Tactic: Impact",
79 "Resources: Investigation Guide",
80]
81timestamp_override = "event.ingested"
82type = "new_terms"
83
84query = '''
85event.dataset: azure.activitylogs and
86 azure.activitylogs.operation_name: "MICROSOFT.COMPUTE/SNAPSHOTS/DELETE" and
87 azure.activitylogs.properties.status_code: "Accepted" and
88 azure.activitylogs.identity.claims_initiated_by_user.name: *
89'''
90
91[rule.investigation_fields]
92field_names = [
93 "@timestamp",
94 "azure.activitylogs.identity.claims_initiated_by_user.name",
95 "azure.activitylogs.identity.authorization.evidence.principal_id",
96 "azure.activitylogs.identity.claims.appid",
97 "azure.activitylogs.identity.claims.sid",
98 "azure.resource.name",
99 "azure.resource.group",
100 "azure.activitylogs.operation_name",
101 "azure.subscription_id",
102 "azure.activitylogs.tenant_id",
103 "source.ip",
104]
105
106
107[[rule.threat]]
108framework = "MITRE ATT&CK"
109[[rule.threat.technique]]
110id = "T1485"
111name = "Data Destruction"
112reference = "https://attack.mitre.org/techniques/T1485/"
113
114[[rule.threat.technique]]
115id = "T1490"
116name = "Inhibit System Recovery"
117reference = "https://attack.mitre.org/techniques/T1490/"
118
119
120[rule.threat.tactic]
121id = "TA0040"
122name = "Impact"
123reference = "https://attack.mitre.org/tactics/TA0040/"
124
125[rule.new_terms]
126field = "new_terms_fields"
127value = ["azure.activitylogs.identity.claims_initiated_by_user.name", "azure.resource.group"]
128[[rule.new_terms.history_window_start]]
129field = "history_window_start"
130value = "now-7d"
Triage and analysis
Investigating Azure Compute Snapshot Deletion by Unusual User and Resource Group
Azure disk snapshots provide point-in-time copies of managed disks, serving as critical components for backup strategies, disaster recovery plans, and forensic investigations. Snapshots enable organizations to restore data and reconstruct system states after security incidents. Adversaries aware of backup strategies may delete snapshots to prevent recovery, eliminate forensic evidence, or maximize impact before executing ransomware attacks. This detection monitors for snapshot deletion operations to identify potential attempts to compromise backup and recovery capabilities. This is a New Terms rule that looks for this behavior by a user and resource group that has not been seen in the last 7 days.
Possible investigation steps
- Review the Azure activity logs to identify the user or service principal that initiated the snapshot deletion by examining the principal ID, UPN and user agent fields.
- Check the specific snapshot name in
azure.resource.nameto understand which backup was deleted and assess the potential impact on recovery capabilities. - Investigate the timing of the event to correlate with any other suspicious activities, such as unusual login patterns, privilege escalation attempts, or other resource deletions.
- Examine the user's recent activity history to identify any other snapshots, disks, or Azure resources that were deleted or modified by the same principal.
- Verify if the snapshot deletion aligns with approved change requests, maintenance windows, or data retention policies in your organization.
- Check if other backup-related resources (backup vaults, recovery services) were accessed or modified around the same time.
- Review any related alerts or activities such as data encryption, VM modifications, or access policy changes that occurred before the deletion.
- Investigate if the account was recently compromised by checking for suspicious authentication events or privilege escalations.
False positive analysis
- Legitimate cleanup of expired snapshots according to data retention policies may trigger this alert. Document approved retention management processes and consider creating exceptions for automated retention tools or scheduled cleanup activities.
- DevOps automation tools might delete temporary snapshots created during deployment or testing processes. Identify service principals used by CI/CD pipelines and consider time-based exceptions during deployment windows.
- Storage optimization initiatives may involve deleting old or redundant snapshots to reduce costs. Coordinate with infrastructure teams to understand planned optimization activities and create exceptions during documented maintenance windows.
- Disaster recovery testing may involve creating and deleting test snapshots. Work with business continuity teams to identify these patterns and create exceptions during scheduled DR testing periods.
Response and remediation
- Immediately investigate whether the deletion was authorized by verifying with the account owner, backup administrators, or relevant stakeholders.
- If the deletion was unauthorized, disable the compromised user account or service principal immediately to prevent further damage.
- Check if the snapshot can be recovered through Azure backup services or soft-delete capabilities if enabled.
- Create new snapshots of critical disks immediately if the deleted snapshot was part of your backup strategy.
- Review and audit all Azure RBAC permissions to identify how the attacker gained snapshot deletion capabilities.
- Conduct a full security assessment to identify the initial access vector and any other compromised accounts or resources.
- Implement Azure Resource Locks on critical snapshots to prevent accidental or malicious deletion.
- Configure Azure Policy to restrict snapshot deletion permissions to only authorized backup administrators.
- Enable Azure Activity Log alerts to notify security teams immediately when snapshots are deleted.
- Review backup and disaster recovery procedures to ensure redundant backup mechanisms exist beyond Azure snapshots.
- Document the incident and update security policies and procedures to prevent similar incidents in the future.
References
Related rules
- Azure Compute Snapshot Deletions by User
- Azure Compute Restore Point Collection Deleted by Unusual User
- Azure Compute Restore Point Collections Deleted
- Azure Storage Account Deletion by Unusual User
- Azure Storage Account Deletions by User