Exfiltration Over Web Service
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel.
Description
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Data Loss Prevention
Quick Info
- Technique ID
- T1567
- Tactic
- Exfiltration
- Sub-Techniques
- 4
- Mitigations
- 1
