EXPLORE
← Back to Explore
T1567.003

Exfiltration to Text Storage Sites

Adversaries may exfiltrate data to text storage sites instead of their primary command and control channel. Text storage sites, such as <code>pastebin[.]com</code>, are commonly used by developers to share code and other information. Text storage sites are often used to host malicious code for C2 communication (e.g., [Stage Capabilities](https://attack.mitre.org/techniques/T1608)), but adversaries may also use these sites to exfiltrate collected data. Furthermore, paid features and encryption...

LinuxmacOSWindowsESXi
2
Detections
1
Sources
0
Threat Actors

BY SOURCE

2elastic

PROCEDURES (1)

Network Connection Monitoring2 detections

Auto-extracted: 2 detections for network connection monitoring

DETECTIONS (2)