Esc
Exfiltration over USB - T1052.001
(ATT&CK® Technique)
Definition
Adversaries may attempt to exfiltrate data over a USB connected physical device. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a USB device introduced by a user. The USB device could be used as the final exfiltration point or to hop between otherwise disconnected systems.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.