| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Rclone can compress files using |
| Enterprise | T1030 | 数据传输大小限制 |
The Rclone "chunker" overlay supports splitting large files in smaller chunks during upload to circumvent size limits.[1][5] |
|
| Enterprise | T1083 | 文件和目录发现 |
Rclone can list files and directories with the |
|
| Enterprise | T1048 | .002 | 替代协议渗出: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.[1] |
| .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
Rclone can exfiltrate data over FTP or HTTP, including HTTP via WebDAV.[1] |
||
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.[1][5] |
| ID | Name | References |
|---|---|---|
| G1032 | INC Ransom | |
| G1003 | Ember Bear |
Ember Bear has used Rclone to exfiltrate information from victim environments.[7] |
| G1024 | Akira | |
| G1021 | Cinnamon Tempest |