MITRE ATT&CK Technique
Exfiltration T1567.002
Description

Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. Cloud storage services allow for the storage, edit, and retrieval of data from a remote cloud storage server over the Internet. Examples of cloud storage services include Dropbox and Google Docs. Exfiltration to these cloud storage services can provide a significant amount of cover to the adversary if hosts within the network are already communicating with the service.

Supported Platforms
ESXi Linux macOS Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-03-09T15:04:32.767Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may exfiltrate data to a cloud storage service '
                'rather than over their primary command and control channel. '
                'Cloud storage services allow for the storage, edit, and '
                'retrieval of data from a remote cloud storage server over the '
                'Internet.\n'
                '\n'
                'Examples of cloud storage services include Dropbox and Google '
                'Docs. Exfiltration to these cloud storage services can '
                'provide a significant amount of cover to the adversary if '
                'hosts within the network are already communicating with the '
                'service. ',
 'external_references': [{'external_id': 'T1567.002',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1567/002'}],
 'id': 'attack-pattern--bf1b6176-597c-4600-bfcd-ac989670f96b',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'exfiltration'}],
 'modified': '2025-10-24T17:49:19.048Z',
 'name': 'Exfiltration to Cloud Storage',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['ESXi', 'Linux', 'macOS', 'Windows'],
 'x_mitre_version': '1.3'}
Quick Actions
Related Threat Actors (31)
0apt
Low

safepay
High

sinobi
High

Indrik Spider
High

LuminousMoth
High