Critical Infrastructure Cybersecurity Framework

Scheduled Transfer

Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals.

Description

Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals.

Quick Info

Technique ID
T1029
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.