Exfiltration Over Physical Medium

From ATT&CK
Jump to: navigation, search
Exfiltration Over Physical Medium
Technique
ID T1052
Tactic Exfiltration
Platform Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows XP, Windows 7, Windows 8, Windows Server 2003 R2, Windows Server 2008 R2, Windows Server 2012 R2, Windows Vista, Windows 8.1
System Requirements Presence of physical medium or device
Data Sources Data loss prevention, File monitoring
Requires Network No

In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a physical medium or device introduced by a user. Such media could be an external hard drive, USB drive, cellular phone, MP3 player, or other removable storage and processing device. The physical medium or device could be used as the final exfiltration point or to hop between otherwise disconnected systems.

Examples

  • SPACESHIP copies staged data to removable drives when they are inserted into the system.1
  • Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.2
  • Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.3
  • USBStealer exfiltrates collected files via removable media from air-gapped victims.4

Mitigation

Disable Autorun if it is unnecessary.5 Disallow or restrict removable media at an organizational policy level if they are not required for business operations.6

Detection

Monitor file access on removable media. Detect processes that execute when removable media are mounted.