Skip to main content

Unexpected Azure API calls indicating restore point collection deletion

ID:azure_compute_restore_point_deleted_anomaly
Data type:Azure Activity
Severity:
Low
-
Medium
MITRE ATT&CK:TA0040:T1485

Description

AlphaSOC detected deletion of an Azure Compute restore point collection via Microsoft.Compute/restorePointCollections/delete. Restore point collections contain recovery points for virtual machines, enabling point-in-time restoration.

Deleting restore point collections is a technique used by ransomware operators to prevent recovery without paying ransom. By eliminating backup and recovery options, attackers maximize the impact of destructive attacks.

Impact

Deletion of restore point collections eliminates the ability to recover virtual machines to previous states. This is particularly devastating in ransomware scenarios where VMs are encrypted and recovery options are systematically destroyed. Organizations may face extended downtime and data loss.

Severity

SeverityCondition
Low
Unexpected action or ASN
Medium
Two unexpected properties at the same time

Investigation and Remediation

Review Azure Activity logs to identify who deleted the restore point collection and which VMs were affected. Check for other backup deletions or destructive activities that may indicate a ransomware attack in progress.

If unauthorized, immediately investigate for signs of ransomware or destructive malware. Protect remaining backups by restricting access. Check if Azure Backup vaults or other recovery options remain available. Implement RBAC policies to restrict restore point deletion and consider enabling resource locks on critical recovery resources.

Known False Positives

  • Planned cleanup of old restore points
  • VM decommissioning activities
  • Storage cost optimization