MITRE ATT&CK Technique
Exfiltration T1567
Description

Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to compromise. Firewall rules may also already exist to permit traffic to these services. Web service providers also commonly use SSL/TLS encryption, giving adversaries an added level of protection.

Supported Platforms
ESXi Linux macOS Office Suite SaaS Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-03-09T12:51:45.570Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may use an existing, legitimate external Web '
                'service to exfiltrate data rather than their primary command '
                'and control channel. Popular Web services acting as an '
                'exfiltration mechanism may give a significant amount of cover '
                'due to the likelihood that hosts within a network are already '
                'communicating with them prior to compromise. Firewall rules '
                'may also already exist to permit traffic to these services.\n'
                '\n'
                'Web service providers also commonly use SSL/TLS encryption, '
                'giving adversaries an added level of protection.',
 'external_references': [{'external_id': 'T1567',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1567'}],
 'id': 'attack-pattern--40597f16-0963-4249-bf4c-ac93b7fb9807',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'exfiltration'}],
 'modified': '2025-10-24T17:48:42.061Z',
 'name': 'Exfiltration Over Web Service',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['William Cain'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['ESXi',
                       'Linux',
                       'macOS',
                       'Office Suite',
                       'SaaS',
                       'Windows'],
 'x_mitre_version': '1.5'}
Quick Actions
Related Threat Actors (8)
shinyhunters
Medium

Contagious Interview
High

Magic Hound
High

BlackByte
High

Akira
High