prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
|
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
|
During the SolarWinds Compromise, It exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has used FTP to exfiltrate files (separately from the C2 channel).
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
During C0017, It exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Carbon uses HTTP to send data to the C2 server.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
ccf32 can upload collected data and files to an FTP server.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
CharmPower can send victim data via FTP with credentials hardcoded in the script.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Cherry Picker exfiltrates files over FTP.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
CORALDECK has exfiltrated data in HTTP POST headers.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has sent stolen payment card data to remote servers via HTTP POSTs.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has used FTP to exfiltrate collected data.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
ftp may be used to exfiltrate data separate from the main command and control protocol.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
KONNI has used FTP to exfiltrate reconnaissance data out.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has exfiltrated data over FTP separately from its primary C2 channel over DNS.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
PoetRAT has used ftp for exfiltration.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has used WinSCP to exfiltrate data from a targeted organization over FTP.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.
|
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
|
It has exfiltrated victim information using FTP.
|
Exfiltration Over C2 Channel
|
ADVSTORESHELL exfiltrates data over the same channel used for C2.
|
Exfiltration Over C2 Channel
|
Amadey has sent victim data to its C2 servers.
|
Exfiltration Over C2 Channel
|
AppleJeus has exfiltrated collected host information to a C2 server.
|
Exfiltration Over C2 Channel
|
AppleSeed can exfiltrate files via the C2 channel.
|
Exfiltration Over C2 Channel
|
It has a tool that exfiltrates data over the C2 channel.
|
Exfiltration Over C2 Channel
|
It's backdoor has exfiltrated data using the already opened channel with its C&C server.
|
Exfiltration Over C2 Channel
|
It has exfiltrated stolen victim data through C2 communications.
|
Exfiltration Over C2 Channel
|
Astaroth exfiltrates collected information from its r1.log file to the external C2 server.
|
Exfiltration Over C2 Channel
|
Attor has exfiltrated data over the C2 channel.
|
Exfiltration Over C2 Channel
|
AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.
|
Exfiltration Over C2 Channel
|
Adversaries can direct BACKSPACE to upload files to the C2 Server.
|
Exfiltration Over C2 Channel
|
BADHATCH can exfiltrate data over the C2 channel.
|
Exfiltration Over C2 Channel
|
Bandook can upload files from a victim's machine over the C2 channel.
|
Exfiltration Over C2 Channel
|
Bankshot exfiltrates data over its C2 channel.
|
Exfiltration Over C2 Channel
|
Bisonal has added the exfiltrated data to the URL over the C2 channel.
|
Exfiltration Over C2 Channel
|
BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.
|
Exfiltration Over C2 Channel
|
BLUELIGHT has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
BoxCaon uploads files and data from a compromised host over the existing C2 channel.
|
Exfiltration Over C2 Channel
|
Bumblebee can send collected data in JSON format to C2.
|
Exfiltration Over C2 Channel
|
During C0017, It used its Cloudflare services C2 channels for data exfiltration.
|
Exfiltration Over C2 Channel
|
CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.
|
Exfiltration Over C2 Channel
|
Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.
|
Exfiltration Over C2 Channel
|
Carberp has exfiltrated data via HTTP to already established C2 servers.
|
Exfiltration Over C2 Channel
|
Caterpillar WebShell can upload files over the C2 channel.
|
Exfiltration Over C2 Channel
|
CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.
|
Exfiltration Over C2 Channel
|
It has used Cobalt Strike C2 beacons for data exfiltration.
|
Exfiltration Over C2 Channel
|
Chrommme can exfiltrate collected data via C2.
|
Exfiltration Over C2 Channel
|
It has exfiltrated stolen files to its C2 server.
|
Exfiltration Over C2 Channel
|
CreepySnail can connect to C2 for data exfiltration.
|
Exfiltration Over C2 Channel
|
Crimson can exfiltrate stolen information over its C2.
|
Exfiltration Over C2 Channel
|
Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API).
|
Exfiltration Over C2 Channel
|
Cyclops Blink has the ability to upload exfiltrated files to a C2 server.
|
Exfiltration Over C2 Channel
|
DnsSystem can exfiltrate collected data to its C2 server.
|
Exfiltration Over C2 Channel
|
Doki has used Ngrok to establish C2 and exfiltrate data.
|
Exfiltration Over C2 Channel
|
Drovorub can exfiltrate files over C2 infrastructure.
|
Exfiltration Over C2 Channel
|
DustySky has exfiltrated data to the C2 server.
|
Exfiltration Over C2 Channel
|
Dyre has the ability to send information staged on a compromised host externally to C2.
|
Exfiltration Over C2 Channel
|
Ebury can exfiltrate SSH credentials through custom DNS queries.
|
Exfiltration Over C2 Channel
|
Emotet has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
Empire can send data gathered from a target through the command and control channel.
|
Exfiltration Over C2 Channel
|
EVILNUM can upload files over the C2 channel from the infected host.
|
Exfiltration Over C2 Channel
|
Flagpro has exfiltrated data to the C2 server.
|
Exfiltration Over C2 Channel
|
FlawedAmmyy has sent data collected from a compromised host to its C2 servers.
|
Exfiltration Over C2 Channel
|
FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.
|
Exfiltration Over C2 Channel
|
During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2.
|
Exfiltration Over C2 Channel
|
FunnyDream can execute commands, including gathering user information, and send the results to C2.
|
Exfiltration Over C2 Channel
|
It used Web shells and HTRAN for C2 and to exfiltrate data.
|
Exfiltration Over C2 Channel
|
A It file stealer can transfer collected files to a hardcoded C2 server.
|
Exfiltration Over C2 Channel
|
GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.
|
Exfiltration Over C2 Channel
|
GoldMax can exfiltrate files over the existing C2 channel.
|
Exfiltration Over C2 Channel
|
Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.
|
Exfiltration Over C2 Channel
|
Grandoreiro can send data it retrieves to the C2 server.
|
Exfiltration Over C2 Channel
|
GrimAgent has sent data related to a compromise host over its C2 channel.
|
Exfiltration Over C2 Channel
|
HAWKBALL has sent system information and files over the C2 channel.
|
Exfiltration Over C2 Channel
|
It exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
HOPLIGHT has used its C2 channel to exfiltrate data.
|
Exfiltration Over C2 Channel
|
HotCroissant has the ability to download files from the infected host to the command and control (C2) server.
|
Exfiltration Over C2 Channel
|
IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.
|
Exfiltration Over C2 Channel
|
Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.
|
Exfiltration Over C2 Channel
|
Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.
|
Exfiltration Over C2 Channel
|
It transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.
|
Exfiltration Over C2 Channel
|
Kessel has exfiltrated information gathered from the infected system to the C2 server.
|
Exfiltration Over C2 Channel
|
Kevin can send data from the victim host through a DNS C2 channel.
|
Exfiltration Over C2 Channel
|
KGH_SPY can exfiltrate collected information from the host to the C2 server.
|
Exfiltration Over C2 Channel
|
It has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
KONNI has sent data and files to its C2 server.
|
Exfiltration Over C2 Channel
|
KOPILUWAK has exfiltrated collected data to its C2 via POST requests.
|
Exfiltration Over C2 Channel
|
It has exfiltrated data and files over a C2 channel through its various tools and malware.
|
Exfiltration Over C2 Channel
|
It has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
LightNeuron exfiltrates data over its email C2 channel.
|
Exfiltration Over C2 Channel
|
LitePower can send collected data, including screenshots, over its C2 channel.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.