Data exfiltration
Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer. It is also commonly called data extrusion or data exportation. Data exfiltration is also considered a form of data theft. Since the year 2000, a number of data exfiltration efforts severely damaged the consumer confidence, corporate valuation, and intellectual property of businesses and national security of governments across the world.
Types of exfiltrated data
In some data exfiltration scenarios, a large amount of aggregated data may be exfiltrated. However, in these and other scenarios, it is likely that certain types of data may be targeted. Types of data that are targeted includes:- Usernames, associated passwords, and other system authentication related information
- Information associated with strategic decisions
- Cryptographic keys
- Personal financial information
- Social security numbers and other personally identifiable information
- Mailing addresses
- United States National Security Agency hacking tools
Techniques
Additionally, there are more sophisticated forms of data exfiltration. Various techniques can be used to conceal detection by network defenses. For example, Cross Site Scripting can be used to exploit vulnerabilities in web applications to provide a malicious actor with sensitive data. A timing channel can also be used to send data a few packets at a time at specified intervals in a way that is even more difficult for network defenses to detect and prevent.
Preventive measures
A number of things can be done to help defend a network against data exfiltration. Three main categories of preventive measures may be the most effective:- Preventive
- Detective
- Investigative
External sources
- http://www.ists.dartmouth.edu/library/293.pdf
- https://www.scmagazine.com/data-exfiltration-defense/article/536744/
Category:Data security
Category:Theft