(Created page with "Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.") |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
Exfiltration | =Description= | ||
Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection. |
Latest revision as of 14:59, 29 January 2023
Description
Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection.
Subcategories
This category has the following 5 subcategories, out of 5 total.
A
- Automated Exfiltration (1 P)
Pages in category "Exfiltration"
The following 4 pages are in this category, out of 4 total.