Common Information
Type Value
Value
Archive Collected Data - T1560
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network.(Citation: DOJ GRU Indictment Jul 2018) Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender. Both compression and encryption are done prior to exfiltration, and can be performed using a utility, 3rd party library, or custom method.
Details Published Attributes CTI Title
Details Website 2021-01-11 91 xHunt Campaign: New BumbleBee Webshell and SSH Tunnels Used for Lateral Movement
Details Website 2020-11-27 14 New MacOS Backdoor Connected to OceanLotus Surfaces
Details Website 2020-10-27 49 North Korean Advanced Persistent Threat Focus: Kimsuky | CISA
Details Website 2020-10-24 31 Emotet Malware | CISA
Details Website 2020-10-22 24 An Inside Look at How Ryuk Evolved Its Encryption and Evasion Techniques - SentinelLabs
Details Website 2020-09-15 22 Iran-Based Threat Actor Exploits VPN Vulnerabilities | CISA
Details Website 2020-09-10 34 Who is calling? CDRThief targets Linux VoIP softswitches | WeLiveSecurity