| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Rclone can compress files using |
| Enterprise | T1030 | Data Transfer Size Limits |
The Rclone "chunker" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.[1][5] |
|
| Enterprise | T1048 | .002 | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.[1] |
| .003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.[1] |
||
| Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.[1][5] |
| Enterprise | T1083 | File and Directory Discovery |
Rclone can list files and directories with the |
|
| ID | Name | References |
|---|---|---|
| G1015 | Scattered Spider | |
| G1051 | Medusa Group |
Medusa Group has leveraged Rclone to exfiltrate data from victim environments.[7][8] |
| G1053 | Storm-0501 |
Storm-0501 has utilized Rclone for data exfiltration.[9] |
| G1032 | INC Ransom | |
| G1003 | Ember Bear |
Ember Bear has used Rclone to exfiltrate information from victim environments.[11] |
| G1024 | Akira | |
| G1021 | Cinnamon Tempest |