MITRE ATT&CK Technique
Description
Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport. Adversaries may abuse various utilities to compress or encrypt data before exfiltration. Some third party utilities may be preinstalled, such as <code>tar</code> on Linux and macOS or <code>zip</code> on Windows systems. On Windows, <code>diantz</code> or <code> makecab</code> may be used to package collected files into a cabinet (.cab) file. <code>diantz</code> may also be used to download and compress files from remote locations (i.e. [Remote Data Staging](https://attack.mitre.org/techniques/T1074/002)).(Citation: diantz.exe_lolbas) <code>xcopy</code> on Windows can copy files and directories with a variety of options. Additionally, adversaries may use [certutil](https://attack.mitre.org/software/S0160) to Base64 encode collected data before exfiltration. Adversaries may use also third party utilities, such as 7-Zip, WinRAR, and WinZip, to perform similar activities.(Citation: 7zip Homepage)(Citation: WinRAR Homepage)(Citation: WinZip Homepage)
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2020-02-20T21:01:25.428Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Adversaries may use utilities to compress and/or encrypt '
'collected data prior to exfiltration. Many utilities include '
'functionalities to compress, encrypt, or otherwise package '
'data into a format that is easier/more secure to transport.\n'
'\n'
'Adversaries may abuse various utilities to compress or '
'encrypt data before exfiltration. Some third party utilities '
'may be preinstalled, such as <code>tar</code> on Linux and '
'macOS or <code>zip</code> on Windows systems. \n'
'\n'
'On Windows, <code>diantz</code> or <code> makecab</code> may '
'be used to package collected files into a cabinet (.cab) '
'file. <code>diantz</code> may also be used to download and '
'compress files from remote locations (i.e. [Remote Data '
'Staging](https://attack.mitre.org/techniques/T1074/002)).(Citation: '
'diantz.exe_lolbas) <code>xcopy</code> on Windows can copy '
'files and directories with a variety of options. '
'Additionally, adversaries may use '
'[certutil](https://attack.mitre.org/software/S0160) to Base64 '
'encode collected data before exfiltration. \n'
'\n'
'Adversaries may use also third party utilities, such as '
'7-Zip, WinRAR, and WinZip, to perform similar '
'activities.(Citation: 7zip Homepage)(Citation: WinRAR '
'Homepage)(Citation: WinZip Homepage)',
'external_references': [{'external_id': 'T1560.001',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1560/001'},
{'description': 'A. Roshal. (2020). RARLAB. Retrieved '
'February 20, 2020.',
'source_name': 'WinRAR Homepage',
'url': 'https://www.rarlab.com/'},
{'description': 'Corel Corporation. (2020). WinZip. '
'Retrieved February 20, 2020.',
'source_name': 'WinZip Homepage',
'url': 'https://www.winzip.com/win/en/'},
{'description': 'I. Pavlov. (2019). 7-Zip. Retrieved '
'February 20, 2020.',
'source_name': '7zip Homepage',
'url': 'https://www.7-zip.org/'},
{'description': 'Living Off The Land Binaries, '
'Scripts and Libraries (LOLBAS). '
'(n.d.). Diantz.exe. Retrieved '
'October 25, 2021.',
'source_name': 'diantz.exe_lolbas',
'url': 'https://lolbas-project.github.io/lolbas/Binaries/Diantz/'},
{'description': 'Wikipedia. (2016, March 31). List of '
'file signatures. Retrieved April 22, '
'2016.',
'source_name': 'Wikipedia File Header Signatures',
'url': 'https://en.wikipedia.org/wiki/List_of_file_signatures'}],
'id': 'attack-pattern--00f90846-cbd1-4fc5-9233-df5c2bf2a662',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'collection'}],
'modified': '2025-10-24T17:48:19.477Z',
'name': 'Archive via Utility',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_contributors': ['Mayan Arora aka Mayan Mohan', 'Mark Wee'],
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': True,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['Linux', 'macOS', 'Windows'],
'x_mitre_version': '1.3'}