System Shutdown/Reboot (T1529) is a MITRE ATT&CK technique in the Impact tactic. SOC analysts detect it by monitoring for SIEM, XDR events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.
Adversaries may shutdown or reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating system or hardware may be targeted for disruption or to aid in other tactics such as firmware corruption. Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while continuing to allow the adversary's access via remote services. Adversaries may attempt to shutdown or reboot a system after implanting a bootloader or modifying disk data to make the system inoperable. Rebooting systems can also be used to force firmware or configuration changes to take effect, to clear memory contents including residual malware, or to trigger persistence mechanisms that only activate on startup. In denial of service contexts, forced shutdowns and reboots of critical infrastructure systems can cause operational disruption and physical world impacts.
“System Shutdown/Reboot is documented as technique T1529 in the MITRE ATT&CK knowledge base under the Impact tactic. Detection requires visibility into SIEM, XDR telemetry.”
Detection Strategies
The following detection strategies help SOC analysts identify System Shutdown/Reboot activity. These methods apply across SIEM, XDR environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.
1
Monitor for unauthorized shutdown and reboot commands executed via command line or scripts, particularly those targeting multiple systems simultaneously or using force flags that override user sessions.
2
Alert on shutdown events initiated from remote sessions or by processes that do not normally perform system shutdown operations, correlating with prior suspicious activity to assess whether it is part of an attack chain.
3
Detect scheduled shutdown tasks created by attackers to trigger system shutdowns at specific times, which may be used to time reboots to coincide with attack phases or to cover tracks after completing attack objectives.
4
Monitor for shutdown events on critical infrastructure including domain controllers, core servers, and operational technology systems, as these may have disproportionate impact on business operations.
5
Correlate shutdown events with other attack indicators including credential theft, lateral movement, and destructive payload execution to determine whether shutdowns are being used as part of a coordinated impact operation.
Example Alerts
These realistic alert examples show what System Shutdown/Reboot looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.
CriticalSIEM
Mass System Shutdown Command Executed
WMI used to execute shutdown /s /f /t 0 on 156 systems simultaneously across all network segments. The command was issued by a compromised domain admin account from an external IP address using PowerShell remoting. The simultaneous shutdown of 156 systems including all file servers, application servers, and workstations represents a significant business disruption event consistent with a coordinated destructive attack.
CriticalSIEM
Domain Controller Forced Reboot
Domain controller DC-PRIMARY-01 rebooted via remote management interface. The reboot command was issued by the IPMI interface using default credentials that have not been changed from factory settings. The reboot occurred 3 minutes after a failed attempt to access the domain controller filesystem remotely. This action may have been intended to trigger a bootkit or to deny authentication services during a wider attack.
HighXDR
Scheduled Shutdown Task Created on Servers
Scheduled tasks created on 12 servers simultaneously at 11:47 PM to trigger forced system shutdown at 02:00 AM. The tasks were created by a service account that gained elevated privileges through a vulnerability. The 2:00 AM timing suggests the attacker plans to complete their operation and trigger shutdowns to delay incident response during the early morning period when monitoring coverage is reduced.
Practice Detecting System Shutdown/Reboot
SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including System Shutdown/Reboot. Build detection skills with zero consequences — free forever.
How do SOC analysts detect System Shutdown/Reboot?
SOC analysts detect System Shutdown/Reboot (T1529) by monitoring SIEM, XDR telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for unauthorized shutdown and reboot commands executed via command line or scripts, particularly those targeting multiple systems simultaneous. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect System Shutdown/Reboot?
System Shutdown/Reboot can be detected using SIEM, XDR platforms. SIEM tools are particularly effective for this technique because they provide visibility into the impact phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is System Shutdown/Reboot in real-world attacks?
System Shutdown/Reboot is a well-documented MITRE ATT&CK technique in the Impact tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic System Shutdown/Reboot scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting System Shutdown/Reboot for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Impact techniques like System Shutdown/Reboot. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.