Exfiltration Over Webhook (T1567.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Exfiltration

Exfiltration (TA0010)

The adversary is trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

View on ATT&CK

Procedure Examples

Description Source(s)
Jossef Harush Kadouri. (2022, March 7). Webhook Party — Malicious packages caught exfiltrating data via legit webhook services. Retrieved July 20, 2023. Checkmarx Webhooks
CyberArk Labs. (2023, April 13). The (Not so) Secret War on Discord. Retrieved July 20, 2023. CyberArk Labs Discord
D. (n.d.). Intro to Webhooks. Retrieved July 20, 2023. Discord Intro to Webhooks
Microsoft Threat Intelligence. (2023, October 3). Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement. Retrieved October 3, 2023. Microsoft SQL Server
Nick Biasini, Edmund Brumaghin, Chris Neal, and Paul Eubanks. (2021, April 7). https://blog.talosintelligence.com/collab-app-abuse/. Retrieved July 20, 2023. Talos Discord Webhook Abuse
Push Security. (2023, July 31). Webhooks. Retrieved August 4, 2023. Push Security SaaS Attacks Repository Webhooks
RedHat. (2022, June 1). What is a webhook?. Retrieved July 20, 2023. RedHat Webhooks