Data Exfiltration Techniques

🕵️‍♂️ Data Exfiltration Techniques — One-Page Overview #

🌐 Network / Protocol Channels #

TechniqueDescriptionKey Mitigations
DNS tunnelingEncodes data into DNS queries/subdomains to attacker DNS.Egress DNS only via internal resolvers, monitor high-entropy queries, block suspicious domains.
HTTP(S) exfiltrationSends data via POST/GET requests or WebSockets to external servers.Proxy inspection, CASB, DLP, block unknown domains.
DoH / DoT abuseUses encrypted DNS to bypass DNS monitoring.Allow DoH only to corporate resolvers, block public DoH.
Email exfiltrationSends sensitive files via SMTP or webmail.Email DLP, restrict external recipients.
FTP / SFTP / SCPUploads data to external file servers.Block outbound file transfer protocols, proxy inspection.
Cloud storage abuse (Dropbox, GDrive, etc.)Uploads data to personal cloud accounts.CASB, DLP, restrict unsanctioned apps.
VPN / SSH / Reverse shellCreates encrypted tunnels to attacker infrastructure.Egress filtering, detect long-lived tunnels, block unauthorized ports.
ICMP / UDP / TCP covert channelsHides data in packet payloads or headers.Restrict ICMP/UDP, IDS/IPS signatures.
P2P / TorrentUses P2P protocols to share data.Block P2P, monitor for protocol signatures.

⚙️ Application / Database Techniques #

TechniqueDescriptionKey Mitigations
SQL injectionExfiltrates DB data through injected queries.Parameterized queries, WAF.
API abuse / parameter tamperingLegitimate API used to extract excessive data.Rate limits, authZ checks, API gateway logging.
SSRFServer requests internal resources and leaks data out.Validate URLs, restrict outbound requests.
Verbose error / log leaksSensitive data exposed via logs or debug messages.Sanitize logs and error messages.

💻 Host / Endpoint Techniques #

TechniqueDescriptionKey Mitigations
Removable media (USB, SD)Copies data to external drives.Disable/whitelist USB, endpoint DLP.
Screenshots / clipboard / cameraCaptures and exports visible data.MDM restrictions, EDR monitoring.
SteganographyHides data in images, audio, or video.DLP, content inspection.
Compressed / encrypted archivesPacks data into small encrypted files.Behavioral analytics, sandbox inspection.

🕳️ Covert / Side-Channel Methods #

TechniqueDescriptionKey Mitigations
Timing / traffic patternsEncodes data via request timing.Anomaly detection, traffic analysis.
Optical / acoustic / thermalUses LEDs, speakers, or heat emissions.Physical controls, disable unused peripherals.
Air-gap bridgingMoves data via infected USBs or nearby devices.Strict physical controls, media handling policy.

👥 Social / Insider Channels #

TechniqueDescriptionKey Mitigations
Phishing or social engineeringTricking users to upload or share sensitive data.Awareness training, DLP.
Insider exfiltrationMalicious or careless employee copies data.Least privilege, UEBA, auditing.
Third-party/vendor misuseVendor or partner exfiltrates via authorized access.Vendor monitoring, contract security clauses.

🔍 Common Indicators #

  • Outbound traffic to unknown or rare domains/IPs
  • High-entropy DNS queries or large DNS volume
  • Unusual HTTP POSTs or uploads
  • Large email attachments or bulk DB exports
  • Frequent connections to cloud storage or new APIs
  • Off-hours or geo-anomalous activity

🛡️ Core Mitigation Stack #

  • Egress filtering & proxy logging
  • DNS monitoring and allowlists
  • DLP (email, web, cloud)
  • CASB for SaaS control
  • Endpoint DLP + EDR + MDM
  • Strong auth & least privilege
  • UEBA + SIEM monitoring
  • Patch vulnerable apps & DBs

In short:

Data exfiltration hides sensitive data in normal-looking traffic, files, or behaviors. Layer controls: monitor egress, limit channels, detect anomalies, and enforce least privilege.