Exfiltration over USB - T1052.001 (a3e1e6c5-9c74-4fc0-a16c-a9d228c17829)
Adversaries may attempt to exfiltrate data over a USB connected physical device. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a USB device introduced by a user. The USB device could be used as the final exfiltration point or to hop between otherwise disconnected systems.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Exfiltration over USB - T1052.001 (a3e1e6c5-9c74-4fc0-a16c-a9d228c17829) | Attack Pattern | Exfiltration Over Physical Medium - T1052 (e6415f09-df0e-48de-9aba-928c902b7549) | Attack Pattern | 1 |