Skip to content

Latest commit

 

History

History
49 lines (39 loc) · 1.46 KB

automated-exfiltration.md

File metadata and controls

49 lines (39 loc) · 1.46 KB
ID E1020
Objective(s) Exfiltration
Related ATT&CK Techniques Automated Exfiltration (T1020)
Version 2.1
Created 1 August 2019
Last Modified 18 December 2023

Automated Exfiltration

Malware may automatically transfer, or exfiltrate, collected data from a compromised system to a remote location controlled by the attacker through automated processes or scripting. This is often done to minimize the attacker's manual interaction with the system and to maintain a low profile, thereby reducing the chances of detection.

See ATT&CK Technique: Automated Exfiltration (T1020).

Methods

Name ID Description
Exfiltrate via File Hosting Service E1020.m01 Malware may exfiltrate files to a file hosting location.

Use in Malware

Name Date Method Description
Attor 2013 -- Attor has a file uploader plugin that automatically exfiltrates collected data and log files to a C2 server.[1]

References

[1] https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Attor.pdf