Linux Auditd Clipboard Data Copy
Clipboard Data
Clipboard Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Clipboard Data
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle
Browser Session Hijacking
Query Registry, System Network Connections Discovery, Permission Groups Discovery, System Network Configuration Discovery, OS Credential Dumping, System Info...
Email Collection, Email Forwarding Rule
Email Collection, Email Forwarding Rule
Screen Capture
Email Collection
Data Staged
Automated Collection
Steal or Forge Authentication Certificates, Archive Collected Data
Archive Collected Data
Browser Session Hijacking
Browser Session Hijacking
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Screen Capture
Email Collection, Email Forwarding Rule
Email Collection, Email Forwarding Rule
Email Collection, Email Forwarding Rule
Email Collection, Email Forwarding Rule
Automated Collection
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Screen Capture
Data from Local System
Data from Cloud Storage
Data from Cloud Storage
Data from Cloud Storage
Remote Email Collection
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Data from Cloud Storage
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Remote Email Collection
Email Collection
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Automated Collection
Email Collection, Local Email Collection
Email Collection, Local Email Collection
Remote Email Collection, Email Collection
Remote Email Collection, Email Collection
Browser Session Hijacking
Remote Email Collection
Data from Cloud Storage
Remote Email Collection, Email Collection, Account Manipulation, Additional Cloud Roles
Remote Email Collection, Email Collection, Account Manipulation, Additional Cloud Roles
Screen Capture
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Clipboard Data
GUI Input Capture, Input Capture
GUI Input Capture, Input Capture
Email Collection, Local Email Collection
Email Collection, Local Email Collection
Data from Cloud Storage
Exfiltration Over Web Service, Email Collection, Remote Email Collection
Exfiltration Over Web Service, Email Collection, Remote Email Collection
Email Collection, Email Forwarding Rule
Email Collection, Email Forwarding Rule
Screen Capture
Network Share Discovery, Data from Network Shared Drive
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Remote Email Collection, Email Collection, Additional Email Delegate Permissions, Account Manipulation
Remote Email Collection, Email Collection, Additional Email Delegate Permissions, Account Manipulation