ID | Name |
---|---|
T1567.001 | Exfiltration to Code Repository |
T1567.002 | Exfiltration to Cloud Storage |
Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. Cloud storage services allow for the storage, edit, and retrieval of data from a remote cloud storage server over the Internet.
Examples of cloud storage services include Dropbox and Google Docs. Exfiltration to these cloud storage services can provide a significant amount of cover to the adversary if hosts within the network are already communicating with the service.
ID | Name | Description |
---|---|---|
S0635 | BoomBox |
BoomBox can upload data to dedicated per-victim folders in Dropbox.[1] |
S0651 | BoxCaon |
BoxCaon has the capability to download folders' contents on the system and upload the results back to its Dropbox drive.[2] |
G0114 | Chimera |
Chimera has exfiltrated stolen data to OneDrive accounts.[3] |
S0660 | Clambling |
Clambling can send files from a victim's machine to Dropbox.[4][5] |
G0142 | Confucius |
Confucius has exfiltrated victim data to cloud storage service accounts.[6] |
S0538 | Crutch | |
S0363 | Empire | |
G0046 | FIN7 |
FIN7 has exfiltrated stolen data to the MEGA file sharing site.[9] |
G0125 | HAFNIUM |
HAFNIUM has exfiltrated data to file sharing sites, including MEGA.[10] |
S0037 | HAMMERTOSS |
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.[11] |
G0094 | Kimsuky |
Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.[12] |
G0032 | Lazarus Group |
Lazarus Group has exfiltrated stolen data to Dropbox using a customized version of dbxcli.[13][14] |
G0065 | Leviathan |
Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.[15][16] |
S0340 | Octopus | |
S0629 | RainyDay |
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.[18] |
S0240 | ROKRAT |
ROKRAT can send collected data to cloud storage services such as PCloud.[19][20] |
G0027 | Threat Group-3390 |
Threat Group-3390 has exfiltrated stolen data to Dropbox.[4] |
G0010 | Turla |
Turla has used WebDAV to upload stolen USB files to a cloud drive.[21] Turla has also exfiltrated stolen files to OneDrive and 4shared.[22] |
G0128 | ZIRCONIUM |
ID | Mitigation | Description |
---|---|---|
M1021 | Restrict Web-Based Content |
Web proxies can be used to enforce an external network communication policy that prevents use of unauthorized external services. |
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0029 | Network Traffic | Network Traffic Content |
Network Traffic Flow |
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server) to known cloud storage services. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. User behavior monitoring may help to detect abnormal patterns of activity.