Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Rclone can compress files using |
Enterprise | T1030 | Data Transfer Size Limits |
The Rclone "chunker" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.[1][5] |
|
Enterprise | T1048 | .002 | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.[1] |
.003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.[1] |
||
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.[1][5] |
Enterprise | T1083 | File and Directory Discovery |
Rclone can list files and directories with the |
ID | Name | References |
---|---|---|
G1032 | INC Ransom | |
G1003 | Ember Bear |
Ember Bear has used Rclone to exfiltrate information from victim environments.[7] |
G1024 | Akira | |
G1021 | Cinnamon Tempest |