Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
Pages in category "Exfiltration Over Alternative Protocol"
The following 3 pages are in this category, out of 3 total.