Exfiltration (TA0010)


Towards the end of an operation, threat actors – depending on their objectives – will need to exfiltrate discovered and archived data from compromised devices. To avoid detection, they will leverage a number of tactics and techniques. For example, threat actors can use a compromised server for exfiltration or leverage cloud storage such as Google Drive or Dropbox to remove data from the compromised network.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia