prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Rclone can exfiltrate data over SFTP or HTTPS via WebDAV. |
Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | During the SolarWinds Compromise, It exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has used FTP to exfiltrate files (separately from the C2 channel). |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | BITSAdmin can be used to create BITS Jobs to upload files from a compromised host. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | During C0017, It exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Carbon uses HTTP to send data to the C2 server. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | ccf32 can upload collected data and files to an FTP server. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | CharmPower can send victim data via FTP with credentials hardcoded in the script. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Cherry Picker exfiltrates files over FTP. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | CORALDECK has exfiltrated data in HTTP POST headers. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has sent stolen payment card data to remote servers via HTTP POSTs. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has used FTP to exfiltrate collected data. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | ftp may be used to exfiltrate data separate from the main command and control protocol. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | KONNI has used FTP to exfiltrate reconnaissance data out. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has exfiltrated data over FTP separately from its primary C2 channel over DNS. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | PoetRAT has used ftp for exfiltration. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has used WinSCP to exfiltrate data from a targeted organization over FTP. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl. |
Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol | It has exfiltrated victim information using FTP. |
Exfiltration Over C2 Channel | ADVSTORESHELL exfiltrates data over the same channel used for C2. |
Exfiltration Over C2 Channel | Amadey has sent victim data to its C2 servers. |
Exfiltration Over C2 Channel | AppleJeus has exfiltrated collected host information to a C2 server. |
Exfiltration Over C2 Channel | AppleSeed can exfiltrate files via the C2 channel. |
Exfiltration Over C2 Channel | It has a tool that exfiltrates data over the C2 channel. |
Exfiltration Over C2 Channel | It's backdoor has exfiltrated data using the already opened channel with its C&C server. |
Exfiltration Over C2 Channel | It has exfiltrated stolen victim data through C2 communications. |
Exfiltration Over C2 Channel | Astaroth exfiltrates collected information from its r1.log file to the external C2 server. |
Exfiltration Over C2 Channel | Attor has exfiltrated data over the C2 channel. |
Exfiltration Over C2 Channel | AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP. |
Exfiltration Over C2 Channel | Adversaries can direct BACKSPACE to upload files to the C2 Server. |
Exfiltration Over C2 Channel | BADHATCH can exfiltrate data over the C2 channel. |
Exfiltration Over C2 Channel | Bandook can upload files from a victim's machine over the C2 channel. |
Exfiltration Over C2 Channel | Bankshot exfiltrates data over its C2 channel. |
Exfiltration Over C2 Channel | Bisonal has added the exfiltrated data to the URL over the C2 channel. |
Exfiltration Over C2 Channel | BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests. |
Exfiltration Over C2 Channel | BLUELIGHT has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | BoxCaon uploads files and data from a compromised host over the existing C2 channel. |
Exfiltration Over C2 Channel | Bumblebee can send collected data in JSON format to C2. |
Exfiltration Over C2 Channel | During C0017, It used its Cloudflare services C2 channels for data exfiltration. |
Exfiltration Over C2 Channel | CallMe exfiltrates data to its C2 server over the same protocol as C2 communications. |
Exfiltration Over C2 Channel | Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels. |
Exfiltration Over C2 Channel | Carberp has exfiltrated data via HTTP to already established C2 servers. |
Exfiltration Over C2 Channel | Caterpillar WebShell can upload files over the C2 channel. |
Exfiltration Over C2 Channel | CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST. |
Exfiltration Over C2 Channel | It has used Cobalt Strike C2 beacons for data exfiltration. |
Exfiltration Over C2 Channel | Chrommme can exfiltrate collected data via C2. |
Exfiltration Over C2 Channel | It has exfiltrated stolen files to its C2 server. |
Exfiltration Over C2 Channel | CreepySnail can connect to C2 for data exfiltration. |
Exfiltration Over C2 Channel | Crimson can exfiltrate stolen information over its C2. |
Exfiltration Over C2 Channel | Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API). |
Exfiltration Over C2 Channel | Cyclops Blink has the ability to upload exfiltrated files to a C2 server. |
Exfiltration Over C2 Channel | DnsSystem can exfiltrate collected data to its C2 server. |
Exfiltration Over C2 Channel | Doki has used Ngrok to establish C2 and exfiltrate data. |
Exfiltration Over C2 Channel | Drovorub can exfiltrate files over C2 infrastructure. |
Exfiltration Over C2 Channel | DustySky has exfiltrated data to the C2 server. |
Exfiltration Over C2 Channel | Dyre has the ability to send information staged on a compromised host externally to C2. |
Exfiltration Over C2 Channel | Ebury can exfiltrate SSH credentials through custom DNS queries. |
Exfiltration Over C2 Channel | Emotet has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | Empire can send data gathered from a target through the command and control channel. |
Exfiltration Over C2 Channel | EVILNUM can upload files over the C2 channel from the infected host. |
Exfiltration Over C2 Channel | Flagpro has exfiltrated data to the C2 server. |
Exfiltration Over C2 Channel | FlawedAmmyy has sent data collected from a compromised host to its C2 servers. |
Exfiltration Over C2 Channel | FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server. |
Exfiltration Over C2 Channel | During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2. |
Exfiltration Over C2 Channel | FunnyDream can execute commands, including gathering user information, and send the results to C2. |
Exfiltration Over C2 Channel | It used Web shells and HTRAN for C2 and to exfiltrate data. |
Exfiltration Over C2 Channel | A It file stealer can transfer collected files to a hardcoded C2 server. |
Exfiltration Over C2 Channel | GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006. |
Exfiltration Over C2 Channel | GoldMax can exfiltrate files over the existing C2 channel. |
Exfiltration Over C2 Channel | Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel. |
Exfiltration Over C2 Channel | Grandoreiro can send data it retrieves to the C2 server. |
Exfiltration Over C2 Channel | GrimAgent has sent data related to a compromise host over its C2 channel. |
Exfiltration Over C2 Channel | HAWKBALL has sent system information and files over the C2 channel. |
Exfiltration Over C2 Channel | It exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | HOPLIGHT has used its C2 channel to exfiltrate data. |
Exfiltration Over C2 Channel | HotCroissant has the ability to download files from the infected host to the command and control (C2) server. |
Exfiltration Over C2 Channel | IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2. |
Exfiltration Over C2 Channel | Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2. |
Exfiltration Over C2 Channel | Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request. |
Exfiltration Over C2 Channel | It transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations. |
Exfiltration Over C2 Channel | Kessel has exfiltrated information gathered from the infected system to the C2 server. |
Exfiltration Over C2 Channel | Kevin can send data from the victim host through a DNS C2 channel. |
Exfiltration Over C2 Channel | KGH_SPY can exfiltrate collected information from the host to the C2 server. |
Exfiltration Over C2 Channel | It has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | KONNI has sent data and files to its C2 server. |
Exfiltration Over C2 Channel | KOPILUWAK has exfiltrated collected data to its C2 via POST requests. |
Exfiltration Over C2 Channel | It has exfiltrated data and files over a C2 channel through its various tools and malware. |
Exfiltration Over C2 Channel | It has exfiltrated data over its C2 channel. |
Exfiltration Over C2 Channel | LightNeuron exfiltrates data over its email C2 channel. |
Exfiltration Over C2 Channel | LitePower can send collected data, including screenshots, over its C2 channel. |
Subsets and Splits