EXPLORE
← Back to Explore
T1560.001

Archive via Utility

Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport. Adversaries may abuse various utilities to compress or encrypt data before exfiltration. Some third party utilities may be preinstalled, such as <code>tar</code> on Linux and macOS or <code>zip</code> on Windows systems. On Windows, <code>diantz</code> or <cod...

LinuxmacOSWindows
24
Detections
3
Sources
37
Threat Actors

BY SOURCE

13sigma6splunk_escu5elastic

PROCEDURES (12)

Encrypt4 detections

Auto-extracted: 4 detections for encrypt

Suspicious3 detections

Auto-extracted: 3 detections for suspicious

Process Creation Monitoring3 detections

Auto-extracted: 3 detections for process creation monitoring

Exfiltrat3 detections

Auto-extracted: 3 detections for exfiltrat

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Dump2 detections

Auto-extracted: 2 detections for dump

Container1 detections

Auto-extracted: 1 detections for container

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Container1 detections

Auto-extracted: 1 detections for container

Credential1 detections

Auto-extracted: 1 detections for credential

DETECTIONS (24)