prompt
stringclasses
508 values
procedure
stringlengths
20
478
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
During the SolarWinds Compromise, It exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has used FTP to exfiltrate files (separately from the C2 channel).
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
During C0017, It exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Carbon uses HTTP to send data to the C2 server.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
ccf32 can upload collected data and files to an FTP server.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
CharmPower can send victim data via FTP with credentials hardcoded in the script.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Cherry Picker exfiltrates files over FTP.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
CORALDECK has exfiltrated data in HTTP POST headers.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has sent stolen payment card data to remote servers via HTTP POSTs.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has used FTP to exfiltrate collected data.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
ftp may be used to exfiltrate data separate from the main command and control protocol.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
KONNI has used FTP to exfiltrate reconnaissance data out.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has exfiltrated data over FTP separately from its primary C2 channel over DNS.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
PoetRAT has used ftp for exfiltration.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has used WinSCP to exfiltrate data from a targeted organization over FTP.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol
It has exfiltrated victim information using FTP.
Exfiltration Over C2 Channel
ADVSTORESHELL exfiltrates data over the same channel used for C2.
Exfiltration Over C2 Channel
Amadey has sent victim data to its C2 servers.
Exfiltration Over C2 Channel
AppleJeus has exfiltrated collected host information to a C2 server.
Exfiltration Over C2 Channel
AppleSeed can exfiltrate files via the C2 channel.
Exfiltration Over C2 Channel
It has a tool that exfiltrates data over the C2 channel.
Exfiltration Over C2 Channel
It's backdoor has exfiltrated data using the already opened channel with its C&C server.
Exfiltration Over C2 Channel
It has exfiltrated stolen victim data through C2 communications.
Exfiltration Over C2 Channel
Astaroth exfiltrates collected information from its r1.log file to the external C2 server.
Exfiltration Over C2 Channel
Attor has exfiltrated data over the C2 channel.
Exfiltration Over C2 Channel
AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.
Exfiltration Over C2 Channel
Adversaries can direct BACKSPACE to upload files to the C2 Server.
Exfiltration Over C2 Channel
BADHATCH can exfiltrate data over the C2 channel.
Exfiltration Over C2 Channel
Bandook can upload files from a victim's machine over the C2 channel.
Exfiltration Over C2 Channel
Bankshot exfiltrates data over its C2 channel.
Exfiltration Over C2 Channel
Bisonal has added the exfiltrated data to the URL over the C2 channel.
Exfiltration Over C2 Channel
BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.
Exfiltration Over C2 Channel
BLUELIGHT has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
BoxCaon uploads files and data from a compromised host over the existing C2 channel.
Exfiltration Over C2 Channel
Bumblebee can send collected data in JSON format to C2.
Exfiltration Over C2 Channel
During C0017, It used its Cloudflare services C2 channels for data exfiltration.
Exfiltration Over C2 Channel
CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.
Exfiltration Over C2 Channel
Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.
Exfiltration Over C2 Channel
Carberp has exfiltrated data via HTTP to already established C2 servers.
Exfiltration Over C2 Channel
Caterpillar WebShell can upload files over the C2 channel.
Exfiltration Over C2 Channel
CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.
Exfiltration Over C2 Channel
It has used Cobalt Strike C2 beacons for data exfiltration.
Exfiltration Over C2 Channel
Chrommme can exfiltrate collected data via C2.
Exfiltration Over C2 Channel
It has exfiltrated stolen files to its C2 server.
Exfiltration Over C2 Channel
CreepySnail can connect to C2 for data exfiltration.
Exfiltration Over C2 Channel
Crimson can exfiltrate stolen information over its C2.
Exfiltration Over C2 Channel
Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API).
Exfiltration Over C2 Channel
Cyclops Blink has the ability to upload exfiltrated files to a C2 server.
Exfiltration Over C2 Channel
DnsSystem can exfiltrate collected data to its C2 server.
Exfiltration Over C2 Channel
Doki has used Ngrok to establish C2 and exfiltrate data.
Exfiltration Over C2 Channel
Drovorub can exfiltrate files over C2 infrastructure.
Exfiltration Over C2 Channel
DustySky has exfiltrated data to the C2 server.
Exfiltration Over C2 Channel
Dyre has the ability to send information staged on a compromised host externally to C2.
Exfiltration Over C2 Channel
Ebury can exfiltrate SSH credentials through custom DNS queries.
Exfiltration Over C2 Channel
Emotet has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
Empire can send data gathered from a target through the command and control channel.
Exfiltration Over C2 Channel
EVILNUM can upload files over the C2 channel from the infected host.
Exfiltration Over C2 Channel
Flagpro has exfiltrated data to the C2 server.
Exfiltration Over C2 Channel
FlawedAmmyy has sent data collected from a compromised host to its C2 servers.
Exfiltration Over C2 Channel
FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.
Exfiltration Over C2 Channel
During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2.
Exfiltration Over C2 Channel
FunnyDream can execute commands, including gathering user information, and send the results to C2.
Exfiltration Over C2 Channel
It used Web shells and HTRAN for C2 and to exfiltrate data.
Exfiltration Over C2 Channel
A It file stealer can transfer collected files to a hardcoded C2 server.
Exfiltration Over C2 Channel
GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.
Exfiltration Over C2 Channel
GoldMax can exfiltrate files over the existing C2 channel.
Exfiltration Over C2 Channel
Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.
Exfiltration Over C2 Channel
Grandoreiro can send data it retrieves to the C2 server.
Exfiltration Over C2 Channel
GrimAgent has sent data related to a compromise host over its C2 channel.
Exfiltration Over C2 Channel
HAWKBALL has sent system information and files over the C2 channel.
Exfiltration Over C2 Channel
It exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
HOPLIGHT has used its C2 channel to exfiltrate data.
Exfiltration Over C2 Channel
HotCroissant has the ability to download files from the infected host to the command and control (C2) server.
Exfiltration Over C2 Channel
IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.
Exfiltration Over C2 Channel
Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.
Exfiltration Over C2 Channel
Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.
Exfiltration Over C2 Channel
It transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.
Exfiltration Over C2 Channel
Kessel has exfiltrated information gathered from the infected system to the C2 server.
Exfiltration Over C2 Channel
Kevin can send data from the victim host through a DNS C2 channel.
Exfiltration Over C2 Channel
KGH_SPY can exfiltrate collected information from the host to the C2 server.
Exfiltration Over C2 Channel
It has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
KONNI has sent data and files to its C2 server.
Exfiltration Over C2 Channel
KOPILUWAK has exfiltrated collected data to its C2 via POST requests.
Exfiltration Over C2 Channel
It has exfiltrated data and files over a C2 channel through its various tools and malware.
Exfiltration Over C2 Channel
It has exfiltrated data over its C2 channel.
Exfiltration Over C2 Channel
LightNeuron exfiltrates data over its email C2 channel.
Exfiltration Over C2 Channel
LitePower can send collected data, including screenshots, over its C2 channel.