EXPLORE
← Back to Explore
T1537

Transfer Data to Cloud Account

Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service. A defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider. Such transfers may utilize existing cloud provider APIs and the i...

IaaSOffice SuiteSaaS
26
Detections
3
Sources
3
Threat Actors

BY SOURCE

13elastic7splunk_escu6sigma

PROCEDURES (18)

Aws3 detections

Auto-extracted: 3 detections for aws

C23 detections

Auto-extracted: 3 detections for c2

Cloud2 detections

Auto-extracted: 2 detections for cloud

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Credential2 detections

Auto-extracted: 2 detections for credential

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Tamper1 detections

Auto-extracted: 1 detections for tamper

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Service1 detections

Auto-extracted: 1 detections for service

Tamper1 detections

Auto-extracted: 1 detections for tamper

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

C21 detections

Auto-extracted: 1 detections for c2

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Persist1 detections

Auto-extracted: 1 detections for persist

C21 detections

Auto-extracted: 1 detections for c2

Service1 detections

Auto-extracted: 1 detections for service

Api1 detections

Auto-extracted: 1 detections for api

Credential1 detections

Auto-extracted: 1 detections for credential

DETECTIONS (26)