Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Data from Network Shared Drive

Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc.) that are accessible from the current system prior to Exfiltration. Interactive command shells may be in use, and common functionality within cmd may be used to gather information.

ID: T1039
Sub-techniques:  No sub-techniques
Tactic: Collection
Platforms: Linux, Windows, macOS
System Requirements: Privileges to access network shared drive
Data Sources: File monitoring, Process command-line parameters, Process monitoring
CAPEC ID: CAPEC-639
Version: 1.2
Created: 31 May 2017
Last Modified: 24 March 2020

Procedure Examples

Name Description
BADNEWS

When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.[1]

BRONZE BUTLER

BRONZE BUTLER has exfiltrated files stolen from file shares.[6]

CosmicDuke

CosmicDuke steals user files from network shared drives with file extensions and keywords that match a predefined list.[2]

menuPass

menuPass has collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.[4]

Ramsay

Ramsay can collect data from network drives and stage it for exfiltration.[3]

Sowbug

Sowbug extracted Word documents from a file server on a victim network.[5]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Monitor processes and command-line arguments for actions that could be taken to collect files from a network share. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.

References