heroui logo

Azure VM Snapshot Deleted

Panther Rules

View Source
Summary
This rule monitors for the deletion of Azure VM disk snapshots, which are critical for backup, disaster recovery, and forensic investigations. An adversary might target such snapshots to inhibit recovery efforts, erase forensic evidence, or disrupt backup strategies, especially in the context of ransomware attacks. The detection focuses on Azure Monitor Activity logs—specifically tuning into logs that indicate deletion operations performed on snapshots. The rule outlines specific actions for response, including querying logs for a period surrounding the deletion event, analyzing patterns across subscriptions, and determining if the activity is consistent with expected maintenance actions. Given its low severity but high potential relevance in operational contexts, it is classified as experimental, encouraging users to evaluate its operational impact and effectiveness in real-world scenarios.
Categories
  • Cloud
  • Azure
  • Infrastructure
Data Sources
  • Cloud Service
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1485
  • T1490
Created: 2026-01-14