Critical Infrastructure Cybersecurity Framework

Data Transfer Size Limits

An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds.

Description

An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds.

Quick Info

Technique ID
T1030
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.