The unauthorized transfer of data from within an organization to an external destination controlled by a threat actor. Exfiltration can occur through email, cloud uploads, USB drives, DNS tunneling, or encrypted channels to avoid detection.
Related Terms
Data Breach
data-protectionAn incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by unauthorized individua...
Data Loss Prevention (DLP)
data-protectionTechnologies and strategies that detect and prevent unauthorized transmission of sensitive data outside the organization...
DNS Tunneling
network-securityA technique that encodes data within DNS queries and responses to create a covert communication channel. Attackers use D...