ID | Name |
---|---|
T1567.001 | Exfiltration to Code Repository |
T1567.002 | Exfiltration to Cloud Storage |
T1567.003 | Exfiltration to Text Storage Sites |
T1567.004 | Exfiltration Over Webhook |
Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. Cloud storage services allow for the storage, edit, and retrieval of data from a remote cloud storage server over the Internet.
Examples of cloud storage services include Dropbox and Google Docs. Exfiltration to these cloud storage services can provide a significant amount of cover to the adversary if hosts within the network are already communicating with the service.
ID | Name | Description |
---|---|---|
G1024 | Akira |
Akira will exfiltrate victim data using applications such as Rclone.[1] |
C0040 | APT41 DUST |
APT41 DUST exfiltrated collected information to OneDrive.[2] |
S0635 | BoomBox |
BoomBox can upload data to dedicated per-victim folders in Dropbox.[3] |
S0651 | BoxCaon |
BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.[4] |
C0015 | C0015 |
During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command |
G0114 | Chimera |
Chimera has exfiltrated stolen data to OneDrive accounts.[6] |
G1021 | Cinnamon Tempest |
Cinnamon Tempest has uploaded captured keystroke logs to the Alibaba Cloud Object Storage Service, Aliyun OSS.[7] |
S0660 | Clambling |
Clambling can send files from a victim's machine to Dropbox.[8][9] |
G0142 | Confucius |
Confucius has exfiltrated victim data to cloud storage service accounts.[10] |
S1023 | CreepyDrive |
CreepyDrive can use cloud services including OneDrive for data exfiltration.[11] |
S0538 | Crutch | |
G1006 | Earth Lusca |
Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.[13] |
G1003 | Ember Bear |
Ember Bear has used tools such as Rclone to exfiltrate information from victim environments to cloud storage such as |
S0363 | Empire | |
G0046 | FIN7 |
FIN7 has exfiltrated stolen data to the MEGA file sharing site.[16] |
G0125 | HAFNIUM |
HAFNIUM has exfiltrated data to file sharing sites, including MEGA.[17] |
S0037 | HAMMERTOSS |
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.[18] |
G1001 | HEXANE |
HEXANE has used cloud services, including OneDrive, for data exfiltration.[11] |
G0119 | Indrik Spider |
Indrik Spider has exfiltrated data using Rclone or MEGASync prior to deploying ransomware.[19] |
G0094 | Kimsuky |
Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.[20] |
G0065 | Leviathan |
Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.[21][22] |
G1014 | LuminousMoth |
LuminousMoth has exfiltrated data to Google Drive.[23] |
S0340 | Octopus | |
C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.[25][26] |
S1102 | Pcexter |
Pcexter can upload stolen files to OneDrive storage accounts via HTTP |
G1005 | POLONIUM |
POLONIUM has exfiltrated stolen data to POLONIUM-owned OneDrive and Dropbox accounts.[11] |
S0629 | RainyDay |
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.[28] |
S1040 | Rclone |
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.[29][5] |
S0240 | ROKRAT |
ROKRAT can send collected data to cloud storage services such as PCloud.[30][31] |
G1015 | Scattered Spider |
Scattered Spider has exfiltrated victim data to the MEGA file sharing site.[32][33] |
G0027 | Threat Group-3390 |
Threat Group-3390 has exfiltrated stolen data to Dropbox.[8] |
G1022 | ToddyCat |
ToddyCat has used a DropBox uploader to exfiltrate stolen files.[27] |
G0010 | Turla |
Turla has used WebDAV to upload stolen USB files to a cloud drive.[34] Turla has also exfiltrated stolen files to OneDrive and 4shared.[35] |
G0102 | Wizard Spider |
Wizard Spider has exfiltrated stolen victim data to various cloud storage providers.[36] |
G0128 | ZIRCONIUM |
ID | Mitigation | Description |
---|---|---|
M1021 | Restrict Web-Based Content |
Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may exfiltrate data to a cloud storage service rather than over their primary command and control channel. |
DS0022 | File | File Access |
Monitor for files being accessed to exfiltrate data to a cloud storage service rather than over their primary command and control channel. |
DS0029 | Network Traffic | Network Connection Creation |
Monitor for newly constructed network connections to cloud services associated with abnormal or non-browser processes. |
Network Traffic Content |
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
||
Network Traffic Flow |
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Monitor for cloud storages for data exfiltration. |