Exfiltration Over Physical Medium
|Exfiltration Over Physical Medium|
|Platform||Linux, macOS, Windows|
|System Requirements||Presence of physical medium or device|
|Data Sources||Data loss prevention, File monitoring|
In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a physical medium or device introduced by a user. Such media could be an external hard drive, USB drive, cellular phone, MP3 player, or other removable storage and processing device. The physical medium or device could be used as the final exfiltration point or to hop between otherwise disconnected systems.
- Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.1
- Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.2
- SPACESHIP copies staged data to removable drives when they are inserted into the system.3
- USBStealer exfiltrates collected files via removable media from air-gapped victims.4
Monitor file access on removable media. Detect processes that execute when removable media are mounted.
- Gostev, A.. (2014, March 12). Agent.btz: a Source of Inspiration?. Retrieved April 8, 2016.
- Kaspersky Lab's Global Research & Analysis Team. (2016, August 9). The ProjectSauron APT. Retrieved August 17, 2016.
- FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved May 1, 2015.
- Calvet, J. (2014, November 11). Sednit Espionage Group Attacking Air-Gapped Networks. Retrieved January 4, 2017.
- Microsoft. (n.d.). How to disable the Autorun functionality in Windows. Retrieved April 20, 2016.
- Microsoft. (2007, August 31). https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx. Retrieved April 20, 2016.