Common Information
Type Value
Value
Remote Data Staging - T1074.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may stage data collected from multiple systems in a central location or directory on one system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location. In cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration. An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and stage data in that instance.(Citation: Mandiant M-Trends 2020) By staging data on one system prior to Exfiltration, adversaries can minimize the number of connections made to their C2 server and better evade detection.
Details Published Attributes CTI Title
Details Website 2024-08-12 27 You Don't Know the HAFNIUM of it...
Details Website 2024-05-06 2 Unmasking Adversary Cloud Defense Evasion Strategies: Modify Cloud Compute Infrastructure Part 1
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2022-10-18 38 APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis
Details Website 2022-10-07 36 CISA Alert AA22-277A - Impacket and CovalentStealer Used to Steal Sensitive Data
Details Website 2022-10-04 34 Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization | CISA
Details Website 2022-09-30 98 A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
Details Website 2022-06-10 76 Threat Attribution — Chimera “Under the Radar”
Details Website 2022-02-23 314 (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware | Mandiant
Details Website 2021-10-04 173 BazarLoader and the Conti Leaks
Details Website 2021-03-11 27 You Don't Know the HAFNIUM of it...
Details Website 2021-03-03 28 Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk
Details Website 2021-01-12 216 Abusing cloud services to fly under the radar
Details Website 2021-01-12 215 Abusing cloud services to fly under the radar
Details Website 2020-08-17 30 WellMess malware: analysis of its Command and Control (C2) server