APFS Snapshots (Local Time Machine Snapshots)

macOSFilesystem & TimelineDisk Image

Location

tmutil listlocalsnapshots / (APFS snapshot metadata embedded in volume)

Description

APFS local snapshots created automatically by Time Machine and the macOS update process. These point-in-time snapshots of the entire filesystem volume are space-efficient copy-on-write snapshots that capture the complete state of every file at creation time. Snapshots can be listed with tmutil and mounted for browsing.

Forensic Value

APFS snapshots act as forensic time capsules, preserving the complete filesystem state from before a compromise. Mounting a pre-incident snapshot and comparing it against the current filesystem reveals every file the attacker created, modified, or deleted. Malware samples that were deleted after execution may still exist in older snapshots. Unlike backup media, local snapshots reside on the same volume and are immediately available without external hardware. Ransomware targeting macOS may attempt to delete snapshots, but failure to do so provides a complete recovery path.

Tools Required

tmutildiskutilmac_aptAPFS FuseAutopsy

Collection Commands

tmutil

tmutil listlocalsnapshots / > /forensics/apfs_snapshots_list.txt

tmutil

tmutil mountlocalsnapshots / && ls /Volumes/ > /forensics/mounted_snapshots.txt

diskutil

diskutil apfs listSnapshots disk1s1 > /forensics/apfs_snapshot_details.txt

mac_apt

python mac_apt.py -i /path/to/image -o /forensics/output APFS_SNAPSHOTS

Collection Constraints

  • Paths, schemas, and permission boundaries vary by macOS release, Full Disk Access state, and whether data came from a live collection, mounted image, or backup source.

MITRE ATT&CK Techniques

T1490T1006T1485T1561.002