Blog
The MITRE ATT&CK Framework: Exfiltration
By Tripwire Researcher on Wed, 05/27/2020
Once an attacker has established access and pivoted around to the point of gathering the necessary data, they will work on exfiltration of that data. Not all malware will reach this stage. Ransomware, for example, usually has no interest in exfiltrating data. As with the Collection tactic, there’s little guidance on how to mitigate an attacker...