Exfiltration to Cloud Storage
Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. Cloud storage services allow for the storage, edit, and retrieval of data from a remote cloud storage server over the Internet. Examples of cloud storage services include Dropbox and Google Docs. Exfiltration to these cloud storage services can provide a significant amount of cover to the adversary if hosts within the network are already communicating with the service.
BY SOURCE
PROCEDURES (21)
Auto-extracted: 6 detections for dns
Auto-extracted: 2 detections for unusual
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for command and control
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for unusual