Critical Infrastructure Cybersecurity Framework

Data Staged

Adversaries may stage collected data in a central location or directory prior to Exfiltration.

Description

Adversaries may stage collected data in a central location or directory prior to Exfiltration.

Quick Info

Technique ID
T1074
Sub-Techniques
2
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.