← Back to Explore
T1567.003
Exfiltration to Text Storage Sites
Adversaries may exfiltrate data to text storage sites instead of their primary command and control channel. Text storage sites, such as <code>pastebin[.]com</code>, are commonly used by developers to share code and other information. Text storage sites are often used to host malicious code for C2 communication (e.g., [Stage Capabilities](https://attack.mitre.org/techniques/T1608)), but adversaries may also use these sites to exfiltrate collected data. Furthermore, paid features and encryption...
LinuxmacOSWindowsESXi
2
Detections
1
Sources
0
Threat Actors
BY SOURCE
2elastic
PROCEDURES (1)
Network Connection Monitoring2 detections
Auto-extracted: 2 detections for network connection monitoring