m (Protected "Category:Exfiltration" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
No edit summary |
||
Line 1: | Line 1: | ||
Exfiltration | =Description= | ||
Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection. |
Latest revision as of 14:59, 29 January 2023
Description
Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection.
Subcategories
This category has the following 5 subcategories, out of 5 total.
A
- Automated Exfiltration (1 P)
Pages in category "Exfiltration"
The following 4 pages are in this category, out of 4 total.