Description
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data.(Citation: Mandiant UNC3944 SMS Phishing 2023) This functionality could also be built into remote access tools. This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files, as well as [Cloud Service Dashboard](https://attack.mitre.org/techniques/T1538) and [Cloud Storage Object Discovery](https://attack.mitre.org/techniques/T1619) to identify resources in cloud environments.
Threat-Mapped Scoring
ATT&CK Kill Chain Metadata
- Tactics: collection
- Platforms: Linux, macOS, Windows, IaaS, SaaS, Office Suite
-
Detection Guidance:
Depending on the method used, actions could include common file system commands and parameters on the command-line interface within batch files or scripts. A sequence of actions like this may be unusual, depending on the system and network environment. Automated collection may occur along with other techniques such as [Data Staged](https://attack.mitre.org/techniques/T1074). As such, file access monitoring that shows an unusual process performing sequential file opens and potentially copy actions to another location on the file system for many files at once may indicate automated collection behavior. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001), as well as through cloud APIs and command line interfaces.
Malware
- AppleSeed
- Attor
- BADNEWS
- Bankshot
- Comnie
- Crutch
- DarkGate
- FunnyDream
- GoldFinder
- Helminth
- InvisiMole
- LightNeuron
- LoFiSe
- Lumma Stealer
- MESSAGETAP
- Metamorfo
- Micropsia
- NETWIRE
- OutSteel
- PACEMAKER
- PoetRAT
- Proxysvc
- RTM
- Raccoon Stealer
- Ramsay
- RotaJakiro
- Rover
- StrelaStealer
- StrongPity
- T9000
- TajMahal
- USBStealer
- VERMIN
- Valak
- WindTail
- Zebrocy
- ccf32