Name |
Retrieve Data from Decommissioned Devices |
|
Likelyhood of attack |
Typical severity |
Medium |
Medium |
|
Summary |
An adversary obtains decommissioned, recycled, or discarded systems and devices that can include an organization’s intellectual property, employee data, and other types of controlled information. Systems and devices that have reached the end of their lifecycles may be subject to recycle or disposal where they can be exposed to adversarial attempts to retrieve information from internal memory chips and storage devices that are part of the system. |
Prerequisites |
An adversary needs to have access to electronic data processing equipment being recycled or disposed of (e.g., laptops, servers) at a collection location and the ability to take control of it for the purpose of exploiting its content. |
Solutions | Backup device data before erasure to retain intellectual property and inside knowledge. Overwrite data on device rather than deleting. Deleted data can still be recovered, even if the device trash can is emptied. Rewriting data removes any trace of the old data. Performing multiple overwrites followed by a zeroing of the device (overwriting with all zeros) is good practice. Use a secure erase software. Physically destroy the device if it is not intended to be reused. Using a specialized service to disintegrate, burn, melt or pulverize the device can be effective, but if those services are inaccessible, drilling nails or holes, or smashing the device with a hammer can be effective. Do not burn, microwave, or pour acid on a hard drive. Physically destroy memory and SIM cards for mobile devices not intended to be reused. Ensure that the user account has been terminated or switched to a new device before destroying. |
Related Weaknesses |
CWE ID
|
Description
|
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-37 |
An attacker examines a target system to find sensitive data that has been embedded within it. This information can reveal confidential contents, such as account numbers or individual keys/credentials that can be used as an intermediate step in a larger attack. |
CAPEC-116 |
An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes. |
|
Taxonomy: ATTACK |
Entry ID
|
Entry Name
|
1052 |
Exfiltration Over Physical Medium |
|