Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Data Encrypted

Data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make the exfiltration less conspicuous upon inspection by a defender. The encryption is performed by a utility, programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by the command and control or file transfer protocol. Common file formats that can encrypt files are RAR and zip.

ID: T1532
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactic: Exfiltration
Platforms: Android, iOS
Version: 1.0
Created: 10 October 2019
Last Modified: 10 October 2019

Procedure Examples

Name Description
Anubis

Anubis exfiltrates data encrypted (with RC4) by its ransomware module.[3]

Exodus

Exodus One encrypts data using XOR prior to exfiltration.[1]

GolfSpy

GolfSpy encrypts data using a simple XOR operation with a pre-configured key prior to exfiltration.[2]

Triada

Triada encrypts data prior to exfiltration.[4]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Many encryption mechanisms are built into standard application-accessible APIs, and are therefore undetectable to the end user.

References