Transfer Data to Cloud Account
Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service. A defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider. Such transfers may utilize existing cloud provider APIs and the i...
BY SOURCE
PROCEDURES (18)
Auto-extracted: 3 detections for aws
Auto-extracted: 3 detections for c2
Auto-extracted: 2 detections for cloud
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for credential
Auto-extracted: 2 detections for suspicious
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for cloud monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for credential