从本地系统获取数据是指攻击者通过访问目标系统的文件系统、数据库或配置存储,收集敏感信息以供后续攻击使用的技术。传统检测手段侧重于监控异常文件访问模式(如大量敏感目录遍历)、可疑进程创建事件(如非授权使用命令行工具)以及非常规数据操作行为(如批量注册表导出)。防御措施包括实施严格的进程白名单、监控命令行活动日志、部署文件完整性监控(FIM)系统等。
为规避传统检测机制,攻击者发展出多维度匿迹技术,通过存储介质规避、操作链伪装、传输特征稀释等手段,将数据窃取行为深度融入系统正常操作中。这些技术突破传统"读取-传输"的线性攻击模式,构建出分布式、低信噪比的持续数据泄露通道。
现有匿迹技术的共性在于重构数据生命周期各阶段的特征表达:在采集环节,通过内存操作和合法工具调用消除磁盘I/O特征;在存储环节,利用文件系统特性实现数据隐形存储;在传输环节,采用分片化和协议混淆技术隐藏泄露流量。具体而言,内存驻留技术将攻击平面从持久化存储转移至易失性内存,规避文件监控;工具链调用通过命令原子化分解突破进程行为分析;分片传输则利用协议合规性重构数据特征形态。这些技术共同形成"采集无痕、存储隐形、传输无形"的新型数据窃取范式。
匿迹技术的演进导致传统基于单点检测(如文件哈希匹配)或简单行为规则(如敏感路径访问告警)的防御体系失效。防御方需构建存储层元数据完整性校验、内存行为谱系分析、跨协议流重组等深度检测能力,并引入用户实体行为分析(UEBA)技术识别异常数据操作模式,实现对抗级数据防泄露防护。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ✅ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
攻击者通过滥用系统合法工具和伪造文件属性,使数据采集行为呈现为正常管理操作。例如将恶意命令嵌入PowerShell脚本的合法参数,或将被窃文件伪装成系统缓存文件,使得传统基于进程签名或文件扩展名的检测机制失效。
内存驻留技术通过完全规避磁盘操作,使得依赖文件监控的防御体系无法感知数据采集行为。攻击者利用操作系统内核机制直接访问内存数据,不产生可追踪的I/O日志,实现"无痕"攻击。
采用内存加密和分片传输技术对敏感数据进行处理,使用TLS或自定义加密协议保护传输内容,使得网络层深度包检测(DPI)和终端数据泄露防护(DLP)系统难以解析有效载荷。
通过时间延迟策略将数据收集周期延长至数月,结合分片传输将单次数据量控制在检测阈值之下。这种长周期、低强度的攻击模式稀释了行为特征密度,使得基于短期行为分析的检测系统难以有效识别。
| ID | Name | Description |
|---|---|---|
| S1028 | Action RAT |
Action RAT can collect local data from an infected machine.[1] |
| G1030 | Agrius |
Agrius gathered data from database and other critical servers in victim environments, then used wiping mechanisms as an anti-analysis and anti-forensics mechanism.[2] |
| S1025 | Amadey | |
| G0138 | Andariel |
Andariel has collected large numbers of files from compromised network systems for later extraction.[4] |
| S0622 | AppleSeed | |
| G0006 | APT1 | |
| G0007 | APT28 |
APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.[8][9][10][11] |
| G0016 | APT29 | |
| G0022 | APT3 |
APT3 will identify Microsoft Office documents on the victim's computer.[13] |
| G0067 | APT37 | |
| G0082 | APT38 | |
| G0087 | APT39 |
APT39 has used various tools to steal files from the compromised host.[16][17] |
| G0096 | APT41 |
APT41 has uploaded files and data from a compromised host.[18] |
| G0143 | Aquatic Panda |
Aquatic Panda captured local Windows security event log data from victim machines using the |
| S1029 | AuTo Stealer |
AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.[1] |
| G0001 | Axiom | |
| S0642 | BADFLICK | |
| S0128 | BADNEWS |
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.[22][23] |
| S0337 | BadPatch |
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.[24] |
| S0234 | Bandook | |
| S0239 | Bankshot | |
| S0534 | Bazar |
Bazar can retrieve information from the infected machine.[27] |
| S0268 | Bisonal |
Bisonal has collected information from a compromised host.[28] |
| S0564 | BlackMould |
BlackMould can copy files on a compromised host.[29] |
| S0520 | BLINDINGCAN |
BLINDINGCAN has uploaded files from victim machines.[30] |
| S0651 | BoxCaon | |
| G0060 | BRONZE BUTLER |
BRONZE BUTLER has exfiltrated files stolen from local systems.[32] |
| S1063 | Brute Ratel C4 |
Brute Ratel C4 has the ability to upload files from a compromised system.[33] |
| S1039 | Bumblebee |
Bumblebee can capture and compress stolen credentials from the Registry and volume shadow copies.[34] |
| C0015 | C0015 |
During C0015, the threat actors obtained files and data from the compromised network.[35] |
| C0017 | C0017 |
During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information (PII) from victim networks.[36] |
| C0026 | C0026 |
During C0026, the threat actors collected documents from compromised hosts.[37] |
| S0274 | Calisto | |
| S0572 | Caterpillar WebShell |
Caterpillar WebShell has a module to collect information from the local database.[39] |
| S1043 | ccf32 | |
| S0674 | CharmPower |
CharmPower can collect data and files from a compromised host.[41] |
| S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can collect files from compromised hosts.[42] |
| S0020 | China Chopper |
China Chopper's server component can upload local files.[43][44][45][46] |
| S0667 | Chrommme | |
| S0660 | Clambling |
Clambling can collect information from a compromised host.[48] |
| S0154 | Cobalt Strike |
Cobalt Strike can collect data from a local system.[49][50] |
| S0492 | CookieMiner |
CookieMiner has retrieved iPhone text messages from iTunes phone backup files.[51] |
| S0050 | CosmicDuke |
CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.[52] |
| C0004 | CostaRicto |
During CostaRicto, the threat actors collected data and files from compromised networks.[53] |
| S1023 | CreepyDrive |
CreepyDrive can upload files to C2 from victim machines.[54] |
| S0115 | Crimson |
Crimson can collect information from a compromised host.[55] |
| S0538 | Crutch | |
| S0498 | Cryptoistic |
Cryptoistic can retrieve files from the local file system.[57] |
| G1012 | CURIUM | |
| C0029 | Cutting Edge |
During Cutting Edge, threat actors stole the running configuration and cache data from targeted Ivanti Connect Secure VPNs.[59][60] |
| S0687 | Cyclops Blink |
Cyclops Blink can upload files from a compromised host.[61] |
| S1014 | DanBot | |
| G0070 | Dark Caracal |
Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.[63] |
| S0673 | DarkWatchman |
DarkWatchman can collect files from a compromised host.[64] |
| S1021 | DnsSystem |
DnsSystem can upload files from infected machines after receiving a command with |
| G0035 | Dragonfly | |
| S0694 | DRATzarus |
DRATzarus can collect information from a compromised host.[67] |
| S0502 | Drovorub | |
| S0567 | Dtrack |
Dtrack can collect a variety of information from victim machines.[69] |
| S1159 | DUSTTRAP | |
| G1003 | Ember Bear |
Ember Bear gathers victim system information such as enumerating the volume of a given device or extracting system and security event logs for analysis.[71][72] |
| S0634 | EnvyScout |
EnvyScout can collect sensitive NTLM material from a compromised host.[73] |
| S0404 | esentutl |
esentutl can be used to collect data from local file systems.[74] |
| S0512 | FatDuke |
FatDuke can copy files and directories from a compromised host.[75] |
| G1016 | FIN13 |
FIN13 has gathered stolen credentials, sensitive data such as point-of-sale (POS), and ATM data from a compromised network before exfiltration.[76][77] |
| G0037 | FIN6 |
FIN6 has collected and exfiltrated payment card data from compromised systems.[78][79][80] |
| G0046 | FIN7 |
FIN7 has collected files and other sensitive information from a compromised network.[81] |
| S0696 | Flagpro |
Flagpro can collect data from a compromised host, including Windows authentication information.[82] |
| S0036 | FLASHFLOOD |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.[83] |
| S0381 | FlawedAmmyy |
FlawedAmmyy has collected information and files from a compromised machine.[84] |
| S0661 | FoggyWeb |
FoggyWeb can retrieve configuration data from a compromised AD FS server.[85] |
| S0193 | Forfiles |
Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).[8] |
| G0117 | Fox Kitten |
Fox Kitten has searched local system resources to access sensitive documents.[86] |
| S0503 | FrameworkPOS |
FrameworkPOS can collect elements related to credit card data from process memory.[87] |
| C0001 | Frankenstein |
During Frankenstein, the threat actors used Empire to gather various local system information.[88] |
| S1044 | FunnyDream |
FunnyDream can upload files from victims' machines.[40][89] |
| G0093 | GALLIUM |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[90] |
| G0047 | Gamaredon Group |
Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.[91] |
| S0666 | Gelsemium | |
| S0477 | Goopy |
Goopy has the ability to exfiltrate documents from infected systems.[92] |
| S0237 | GravityRAT |
GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.[93] |
| S0690 | Green Lambert |
Green Lambert can collect data from a compromised host.[94] |
| S0632 | GrimAgent |
GrimAgent can collect data and files from a compromised host.[95] |
| G0125 | HAFNIUM |
HAFNIUM has collected data and files from a compromised machine.[46] |
| S0009 | Hikit | |
| S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can read data from files.[96][97] |
| S1022 | IceApple |
IceApple can collect files, passwords, and other data from a compromised host.[98] |
| G0100 | Inception |
Inception used a file hunting plugin to collect .txt, .pdf, .xls or .doc files from the infected host.[99] |
| S0260 | InvisiMole |
InvisiMole can collect data from the system, and can monitor changes in specified directories.[100] |
| S1132 | IPsec Helper |
IPsec Helper can identify specific files and folders for follow-on exfiltration.[101] |
| S0015 | Ixeshe | |
| S0265 | Kazuar |
Kazuar uploads files from a specified directory to the C2 server.[103] |
| G0004 | Ke3chang |
Ke3chang gathered information and files from local directories for exfiltration.[104][105] |
| S1020 | Kevin |
Kevin can upload logs and other data from a compromised host.[106] |
| S0526 | KGH_SPY |
KGH_SPY can send a file containing victim system information to C2.[107] |
| G0094 | Kimsuky |
Kimsuky has collected Office, PDF, and HWP documents from its victims.[108][109] |
| S0250 | Koadic |
Koadic can download files off the target system to send back to the server.[110][111] |
| S0356 | KONNI |
KONNI has stored collected information and discovered processes in a tmp file.[112] |
| S1075 | KOPILUWAK |
KOPILUWAK can gather information from compromised hosts.[37] |
| G1004 | LAPSUS$ |
LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.[113] |
| S1160 | Latrodectus |
Latrodectus can collect data from a compromised host using a stealer module.[114] |
| G0032 | Lazarus Group |
Lazarus Group has collected data and files from compromised networks.[115][116][117][118] |
| S0395 | LightNeuron |
LightNeuron can collect files from a local system.[119] |
| S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can obtain data from local systems.[120] |
| S1101 | LoFiSe |
LoFiSe can collect files of interest from targeted systems.[121] |
| G1014 | LuminousMoth |
LuminousMoth has collected files and data from compromised machines.[122][123] |
| S0409 | Machete |
Machete searches the File system for files of interest.[124] |
| S1016 | MacMa |
MacMa can collect then exfiltrate files from the compromised system.[125] |
| S1060 | Mafalda |
Mafalda can collect files and information from a compromised host.[126] |
| G0059 | Magic Hound |
Magic Hound has used a web shell to exfiltrate a ZIP file containing a dump of LSASS memory on a compromised machine.[127][128] |
| S0652 | MarkiRAT |
MarkiRAT can upload data from the victim's machine to the C2 server.[129] |
| S0500 | MCMD |
MCMD has the ability to upload files from an infected device.[130] |
| G0045 | menuPass |
menuPass has collected various files from the compromised computers.[131][132] |
| S1059 | metaMain |
metaMain can collect files and system information from a compromised host.[126][133] |
| S1146 | MgBot |
MgBot includes modules for collecting files from local systems based on a given set of properties and filenames.[134] |
| S1015 | Milan | |
| S0084 | Mis-Type |
Mis-Type has collected files and data from a compromised host.[136] |
| S0083 | Misdat |
Misdat has collected files and data from a compromised host.[136] |
| S0079 | MobileOrder |
MobileOrder exfiltrates data collected from the victim mobile device.[137] |
| S1026 | Mongall |
Mongall has the ability to upload files from victim's machines.[138] |
| S0630 | Nebulae |
Nebulae has the capability to upload collected files to C2.[139] |
| S0691 | Neoichor | |
| C0002 | Night Dragon |
During Night Dragon, the threat actors collected files and other data from compromised systems.[140] |
| S1090 | NightClub |
NightClub can use a file monitor to steal specific files from targeted systems.[141] |
| S0385 | njRAT | |
| S1131 | NPPSPY |
NPPSPY records data entered from the local system logon at Winlogon to capture credentials in cleartext.[143] |
| S0340 | Octopus |
Octopus can exfiltrate files from the system using a documents collector tool.[144] |
| C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors collected data, files, and other information from compromised networks.[145] |
| C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group used malicious Trojans and DLL files to exfiltrate data from an infected host.[67][146] |
| C0006 | Operation Honeybee |
During Operation Honeybee, the threat actors collected data from compromised hosts.[147] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system.[148] |
| S0352 | OSX_OCEANLOTUS.D |
OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.[149] |
| S0594 | Out1 |
Out1 can copy files and Registry data from compromised hosts.[150] |
| S1017 | OutSteel |
OutSteel can collect information from a compromised host.[151] |
| S0598 | P.A.S. Webshell |
P.A.S. Webshell has the ability to copy files on a compromised host.[152] |
| S0208 | Pasam |
Pasam creates a backdoor through which remote attackers can retrieve files.[153] |
| G0040 | Patchwork |
Patchwork collected and exfiltrated files from the infected system.[154] |
| S1102 | Pcexter | |
| S1050 | PcShare |
PcShare can collect files and information from a compromised host.[40] |
| S0517 | Pillowmint |
Pillowmint has collected credit card data using native API functions.[155] |
| S0048 | PinchDuke |
PinchDuke collects user files from the compromised host based on predefined file extensions.[156] |
| S1031 | PingPull | |
| S0012 | PoisonIvy |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[158] |
| S1012 | PowerLess |
PowerLess has the ability to exfiltrate data, including Chrome and Edge browser database files, from compromised machines.[159] |
| S0194 | PowerSploit |
PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.[160][161] |
| S0223 | POWERSTATS |
POWERSTATS can upload files from compromised hosts.[162] |
| S0238 | Proxysvc | |
| S0197 | PUNCHTRACK |
PUNCHTRACK scrapes memory for properly formatted payment card data.[164][165] |
| S0650 | QakBot |
QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.[166][167] |
| S0262 | QuasarRAT |
QuasarRAT can retrieve files from compromised client machines.[168] |
| S0686 | QuietSieve |
QuietSieve can collect files from a compromised host.[169] |
| S1148 | Raccoon Stealer |
Raccoon Stealer collects data from victim machines based on configuration information received from command and control nodes.[170][171] |
| S0629 | RainyDay |
RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.[139] |
| S0458 | Ramsay |
Ramsay can collect Microsoft Word documents from the target's file system, as well as |
| S1113 | RAPIDPULSE |
RAPIDPULSE retrieves files from the victim system via encrypted commands sent to the web shell.[174] |
| S0169 | RawPOS |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.[175][176][177] |
| S0662 | RCSession |
RCSession can collect data from a compromised host.[178][48] |
| G1039 | RedCurl |
RedCurl has collected data from the local disk of compromised hosts.[179][180] |
| S0448 | Rising Sun |
Rising Sun has collected data and files from a compromised host.[181] |
| S0240 | ROKRAT |
ROKRAT can collect host data and specific file types.[182][183][184] |
| S0090 | Rover |
Rover searches for files on local drives based on a predefined list of file extensions.[185] |
| S1018 | Saint Bot |
Saint Bot can collect files and information from a compromised host.[186] |
| S1099 | Samurai |
Samurai can leverage an exfiltration module to download arbitrary files from compromised machines.[187] |
| G0034 | Sandworm Team |
Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.[188] |
| S1085 | Sardonic |
Sardonic has the ability to collect data from a compromised machine to deliver to the attacker.[189] |
| S0461 | SDBbot |
SDBbot has the ability to access the file system on a compromised host.[190] |
| S1019 | Shark | |
| S1089 | SharpDisco |
SharpDisco has dropped a recent-files stealer plugin to |
| S0444 | ShimRat |
ShimRat has the capability to upload collected files to a C2.[192] |
| S0610 | SideTwist |
SideTwist has the ability to upload files from a compromised host.[193] |
| S1110 | SLIGHTPULSE |
SLIGHTPULSE can read files specified on the local system.[194] |
| S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has uploaded files and information from victim machines.[195] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 extracted files from compromised networks.[196] |
| S0615 | SombRAT |
SombRAT has collected data and files from a compromised host.[53][197] |
| S0646 | SpicyOmelette |
SpicyOmelette has collected data and other information from a compromised host.[198] |
| S1037 | STARWHALE |
STARWHALE can collect data from an infected local host.[199] |
| G0038 | Stealth Falcon |
Stealth Falcon malware gathers data from the local victim system.[200] |
| S1034 | StrifeWater |
StrifeWater can collect data from a compromised host.[201] |
| S0559 | SUNBURST |
SUNBURST collected information from a compromised host.[202][203] |
| S1064 | SVCReady | |
| S0663 | SysUpdate |
SysUpdate can collect information and files from a compromised host.[205] |
| S0011 | Taidoor |
Taidoor can upload data and files from a victim's machine.[206] |
| S0467 | TajMahal |
TajMahal has the ability to steal documents from the local system including the print spooler queue.[207] |
| G0027 | Threat Group-3390 |
Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.[208] |
| S0665 | ThreatNeedle |
ThreatNeedle can collect data and files from a compromised host.[118] |
| S0668 | TinyTurla | |
| G1022 | ToddyCat |
ToddyCat has run scripts to collect documents from targeted hosts.[121] |
| S0671 | Tomiris |
Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.[210] |
| S0266 | TrickBot |
TrickBot collects local files and information from the victim’s local machine.[211] |
| G0010 | Turla |
Turla RPC backdoors can upload files from victim machines.[212] |
| S0022 | Uroburos |
Uroburos can use its |
| S0386 | Ursnif |
Ursnif has collected files from victim machines, including certificates and cookies.[214] |
| S0452 | USBferry |
USBferry can collect information from an air-gapped host machine.[215] |
| G1017 | Volt Typhoon |
Volt Typhoon has stolen files from a sensitive file server and the Active Directory database from targeted environments, and used Wevtutil to extract event log information.[216][217][218] |
| S0670 | WarzoneRAT |
WarzoneRAT can collect data from a compromised host.[219] |
| S0515 | WellMail | |
| S0514 | WellMess |
WellMess can send files from the victim machine to C2.[221][222] |
| S0645 | Wevtutil |
Wevtutil can be used to export events from a specific log.[223][224] |
| G0124 | Windigo |
Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[225] |
| G0102 | Wizard Spider |
Wizard Spider has collected data from a compromised host prior to exfiltration.[226] |
| S1065 | Woody RAT |
Woody RAT can collect information from a compromised host.[227] |
| S0653 | xCaon | |
| S0658 | XCSSET |
XCSSET collects contacts and application data from files in Desktop, Documents, Downloads, Dropbox, and WeChat folders.[228] |
| S0248 | yty |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.[229] |
| S0672 | Zox |
Zox has the ability to upload files from a targeted system.[20] |
| S0412 | ZxShell | |
| S1013 | ZxxZ |
| ID | Mitigation | Description |
|---|---|---|
| M1057 | Data Loss Prevention |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may search and collect local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell. For network devices, monitor executed commands in AAA logs, especially those run by unexpected or unauthorized users. |
| DS0022 | File | File Access |
Monitor for unexpected/abnormal access to files that may be malicious collection of local data, such as user files (pdf, .docx, .jpg, etc.) or local databases. |
| DS0009 | Process | OS API Execution |
Monitor for API calls that may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. |
| Process Creation |
Monitor for newly executed processes that may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. |
||
| DS0012 | Script | Script Execution |
Monitor for any attempts to enable scripts running on a system would be considered suspicious. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible to determine their actions and intent. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell. |