Thanks to all of our ATT&CKcon participants. All sessions are here, and individual presentations will be posted soon.

Automated Exfiltration

Data, such as sensitive documents, may be exfiltrated through the use of automated processing or Scripting after being gathered during Collection.

When automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as Exfiltration Over Command and Control Channel and Exfiltration Over Alternative Protocol.

ID: T1020

Tactic: Exfiltration

Platform:  Linux, macOS, Windows

Data Sources:  File monitoring, Process monitoring, Process use of network

Requires Network:  Yes

Version: 1.0

Examples

NameDescription
CosmicDuke

CosmicDuke exfiltrates collected files automatically over FTP to remote servers.[1]

Honeybee

Honeybee performs data exfiltration is accomplished through the following command-line command: from (- --).txt.[2]

Rover

Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.[3]

TINYTYPHON

When a document is found matching one of the extensions in the configuration, TINYTYPHON uploads it to the C2 server.[4]

USBStealer

USBStealer automatically exfiltrates collected files via removable media when an infected device is connected to the second victim after receiving commands from the first victim.[5]

Mitigation

Identify unnecessary system utilities, scripts, or potentially malicious software that may be used to transfer data outside of a network, and audit and/or block them by using whitelisting [6] tools, like AppLocker, [7] [8] or Software Restriction Policies [9] where appropriate. [10]

Detection

Monitor process file access patterns and network behavior. Unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious.

References