Automated Exfiltration
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.(Citation: ESET Gamaredon June 2020) When automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](https://attack.mitre.org/techniques/T1041) and [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048).
BY SOURCE
PROCEDURES (9)
Auto-extracted: 5 detections for general monitoring
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for email security
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for exfiltrat