Critical Infrastructure Cybersecurity Framework
T1567Exfiltration1 Mitigations

Exfiltration Over Web Service

Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel.

Description

Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Data Loss Prevention

Quick Info

Technique ID
T1567
Sub-Techniques
4
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.