Traffic Duplication (T1020.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Exfiltration

Exfiltration (TA0010)

The adversary is trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

View on ATT&CK

Procedure Examples

Description Source(s)
Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022. AWS Traffic Mirroring
Cisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020. Cisco Traffic Mirroring
Google Cloud. (n.d.). Packet Mirroring overview. Retrieved March 17, 2022. GCP Packet Mirroring
Juniper. (n.d.). Understanding Port Mirroring on EX2200, EX3200, EX3300, EX4200, EX4500, EX4550, EX6200, and EX8200 Series Switches. Retrieved October 19, 2020. Juniper Traffic Mirroring
Microsoft. (2022, February 9). Virtual network TAP. Retrieved March 17, 2022. Azure Virtual Network TAP
Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. Cisco Blog Legacy Device Attacks
US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. US-CERT-TA18-106A