Archive Collected Data
An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network.(Citation: DOJ GRU Indictment Jul 2018) Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender. Both compression and encryption are done prior to exfiltration, and can be performed using a utility, 3...
BY SOURCE
PROCEDURES (7)
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for encrypt
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for process creation monitoring