Data from Information Repositories
Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, such as Credential Access, Lateral Movement, or Defense Evasion, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive docu...
BY SOURCE
PROCEDURES (17)
Auto-extracted: 3 detections for service
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for token
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for cloud
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for phish
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for unusual