Automated Exfiltration

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

8 hours 28 minutes
Video Transcription
hello and welcome to another application of the minor attack framework discussion.
Today we're looking at automated ex filtration, and so our objectives are as follows we're going to describe for you what automated ex filtration is per miner, some mitigation techniques detection techniques and will be squeezing some tool talk into this space here.
So with that, let's go ahead and jump into what automated exfiltration is.
And so, as the name suggests, this is when threat actors attempt to take data through automated processing or scripting after everything is gathered during the collection phase. This could be done through exfiltration, over command and control and over alternative protocols,
and so a few tools to keep in mind and some of their capabilities.
Rover, which for me sounds a lot like the game Red Rover that kids used to play, is when automatically searches for files on local drive based on prey, to find lists of file extensions and sends them on over to the command and control server. Every 60 minutes,
tani, typhoon or Typhon is searches for documents, and when one is found with a matching extension, it uploads it to the command and control server USB Stiller is automatically excell traits collected files via removable media when an infected devices connected to a second victim. And so this is essentially
when your initial media gets infected for everything you plug it into. After that, it starts to still data. Some of the common things that we see here are the command and control servers being used in these techniques. Now, mitigation here is still limited to end user awareness training. Because
this reduces the overall risk of compromise,
you may be able to get some of this block to using something like intrusion prevention
and looking for common commanding control signatures and data uploads. Their also. Maybe some discussions that could be had on using firewall protections and other data blocking activities to ensure that files are not precariously uploaded are out of the network.
Now that would just involve some data classification
and additional protections. Put in place detection techniques, conclude monitoring process, file access patterns and network behavior. Again, what is normal for the environment? What is not normal base lining that, and then being able to proactively address instances where it is outside of the norm?
Now, with that, let's do a quick check on learning
true or false Automated ex filtration is when a threat actor automatically removes data from a victim network through things like scripting.
So if you need additional time, Teoh, consider this question. Please pause the video. So automated Ex Filtration is when a threat actor automatically removes data from a victim network through things like scripting. So
with these points in mind, this is a true statement.
Automated ex filtration is essentially when threat actors tried to use tools or automatic means to remove data. Now let's jump into the summary for today's discussion. As we discussed, we looked at automated ex filtration from a scripting or tool standpoint, using those things
to essentially pull data as it's identified and pushed to a commanding control server.
We describe some mitigation techniques, and we looked at detection techniques as well, both of those still being in the realm of behavioral analysis based lining system activity. And any time it's outside of the normally evaluated that activity mitigation techniques still sticking around in user awareness training.
And there may be some credence here for network intrusion prevention and additional data protections.
But again, that end user awareness training is going to be the biggest mitigating factor.
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By