Skip to content

Hide Navigation Hide TOC

MS-T832 - Automated exfiltration (f4a35b50-b56b-5663-8a84-e2235cee712f)

Attackers may exploit legitimate automation processes, predefined by the compromised organization, with the goal of having their logging traces blend in normally within the company’s typical activities. Assimilating or disguising malicious intentions will keep adversary actions, such as data theft, stealthier.

Cluster A Galaxy A Cluster B Galaxy B Level
MS-T832 - Automated exfiltration (f4a35b50-b56b-5663-8a84-e2235cee712f) Threat Matrix for storage services Automated Exfiltration - T1020 (774a3188-6ba9-4dc4-879d-d54ee48a5ce9) Attack Pattern 1