TA0010 Exfiltration

The adversary is trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1567 Exfiltration Over Web Service 28 4
T1029 Scheduled Transfer 14 0
T1011 Exfiltration Over Other Network Medium 11 1
T1020 Automated Exfiltration 11 1
T1041 Exfiltration Over C2 Channel 35 0
T1048 Exfiltration Over Alternative Protocol 52 3
T1030 Data Transfer Size Limits 15 0
T1537 Transfer Data to Cloud Account 37 0
T1052 Exfiltration Over Physical Medium 27 1