Phishing and ransomware are attack methods, while data exfiltration is an objective. Phishing is typically an initial access technique that an attacker uses to gain a foothold in a system. Ransomware encrypts data and demands payment for decryption. Data exfiltration, the unauthorized transfer of data out of a system, can be the goal of either attack. In practice, many modern ransomware campaigns include an exfiltration phase before encryption, using the threat of publishing stolen data as additional pressure on victims.
What Is Data Exfiltration? Definition, Types, and Examples
Learn how data exfiltration works, the main methods attackers use across networks, cloud, and endpoints, and the layered controls that detect and prevent it.
Data exfiltration is one of the clearest signs that a security incident has moved from access to impact. Once information starts leaving a system without authorization, containment becomes harder, investigation gets more complex, and the consequences often expand quickly.
Key Takeaways
Data exfiltration is defined by unauthorized transfer, not by the specific method used to move the data.
Data exfiltration usually follows a sequence of access, discovery, staging, and transfer.
Data exfiltration is related to data breaches, data leakage, and data loss, but those terms do not all mean the same thing.
Effective defense combines controls that limit access with controls that detect suspicious movement of data.
How Data Exfiltration Works
Data exfiltration usually follows a sequence of access, discovery, staging, and transfer.
The attack lifecycle begins with initial access, where an adversary establishes a foothold through phishing, credential theft, vulnerability exploitation, or social engineering. Once inside, the attacker enters a reconnaissance and discovery phase, mapping the internal network to locate databases, file shares, and other repositories containing valuable information. This stage often involves lateral movement between systems to escalate privileges and reach data that the initial account could not access.
Before transmission, attackers frequently stage and package the data. This can include compressing files, encrypting them to avoid content inspection, or splitting them into smaller chunks to stay below volume-based alert thresholds. The MITRE ATT&CK framework positions the Exfiltration tactic (TA0010) between Collection (TA0009) and Command and Control (TA0011) / Impact (TA0040), reflecting how exfiltration serves as the objective-completing step in most intrusions. Attackers collect first, exfiltrate second, and may then deploy ransomware or destructive payloads as a final action.
The actual transfer can happen over the attacker's command and control channel, through an entirely separate protocol, via cloud storage uploads, or even on a USB drive carried out the door. The diversity of available exfiltration channels is what makes detection so difficult: there is no single chokepoint to monitor.
Types and Methods of Data Exfiltration
Data exfiltration methods span network traffic, cloud services, email, physical devices, and covert channels.
Network-Layer Exfiltration
Several exfiltration techniques operate directly at the network level, abusing protocols that organizations typically allow through firewalls. C2 channel exfiltration encodes stolen data into the same communications stream the attacker uses to control compromised systems, blending theft with routine command traffic. DNS tunneling embeds data within DNS query and response packets, exploiting the fact that DNS traffic is almost universally permitted.
Attackers encode payloads as subdomain labels of a domain they control and retrieve responses through TXT or CNAME records. Alternative protocol tunneling takes a similar approach with HTTP/HTTPS, ICMP, or FTP, encapsulating sensitive data within protocol fields or request bodies that firewalls allow to pass. Encrypted traffic exfiltration wraps stolen data in encryption before or during transit, preventing standard data loss prevention (DLP) tools from inspecting the payload without SSL/TLS interception.
Organizations that rely solely on perimeter-based controls often miss these techniques because the traffic appears to use legitimate protocols on expected ports.
Cloud and Email Exfiltration
Cloud and email channels are attractive because their traffic often looks like everyday business activity.
Cloud storage exfiltration involves uploading data to personal or attacker-controlled cloud accounts using common file transfer and synchronization utilities, both documented in recent CISA advisories as actively used by ransomware groups to transfer data: one in AA25-071A covering Medusa ransomware, and another in AA25-203A covering Interlock ransomware.
Email-based exfiltration sends data to external addresses through corporate email, personal webmail, or forwarding rules. Business email compromise (BEC) campaigns combine social engineering with email-channel data theft, using tactics like MFA push bombing and helpdesk impersonation to gain access.
Exfiltration over web services extends this to code repositories, text storage sites, and webhook endpoints on collaboration platforms, all of which offer HTTPS-encrypted channels that look benign from a network monitoring perspective.
Physical and Insider-Driven Exfiltration
Data exfiltration can also happen without any network connection.
Physical media exfiltration involves copying data to USB drives, external hard drives, or optical media and physically removing it from a facility, bypassing all network-layer detection.
Insider privilege misuse occurs when authorized users with legitimate access abuse their permissions to transfer data for unauthorized purposes. The detection challenge here is significant: the data access itself is authorized, so only intent and destination are unusual.
Accidental insider exfiltration covers scenarios where employees send sensitive data to incorrect recipients or misconfigure cloud storage permissions, creating exposure without malicious intent. NIST SP 1800-28 formally recognizes both malicious and non-malicious insider threats as distinct exfiltration threat categories.
Advanced and Emerging Methods
Sophisticated adversaries layer multiple techniques to avoid detection.
APT multi-stage exfiltration involves maintaining access for weeks or months, slowly identifying and staging data before transferring it in carefully timed increments designed to blend with normal traffic.
Steganography and covert channels hide data within carrier files like images and audio, or embed it in protocol header fields not designed for data transport, such as TCP sequence numbers or IP identification fields. These methods are harder to detect because the carrier traffic appears legitimate to content-scanning DLP tools.
Data Exfiltration in the Real World
Data exfiltration commonly appears in ransomware, espionage, and insider incidents.
Ransomware operations frequently exfiltrate data before encrypting systems, then threaten to publish stolen information unless a ransom is paid. Groups like Karakurt and BianLian have taken this further by abandoning encryption entirely and relying on data theft and public exposure as their sole extortion mechanism. In Karakurt's case, a joint FBI and CISA advisory documented exfiltration of entire network-connected shared drives, using a file transfer utility disguised as a system process and a desktop transfer client to move data to cloud storage.
State-sponsored actors operate on different timelines but with equally effective tradecraft. A joint advisory from the FBI, CISA, and NSA documented Russian GRU actors running incremental email query harvesting against Western logistics and technology companies, returning periodically to collect only new messages sent since the last exfiltration event. This model of persistent, recurring access is fundamentally different from opportunistic bulk theft and much harder to detect through volume-based alerting.
The insider threat vector also continues to evolve. Reports have documented workers who gained employment through normal hiring processes, then used legitimate internal access to exfiltrate proprietary data. This approach bypasses external credential compromise entirely and highlights why identity controls and behavioral monitoring matter as much as perimeter security. Similarly, Scattered Spider compromised large enterprises by calling IT help desks, impersonating employees, and using SIM swapping to bypass multi-factor authentication, all in service of data theft for extortion.
Data Exfiltration vs. Data Breach, Data Leakage, and Data Loss
Data exfiltration differs from these related terms because it requires unauthorized transfer, while the others describe broader or different kinds of exposure.
A data breach is the broadest category. The NIST Glossary defines it as the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where a person other than an authorized user accesses or potentially accesses personally identifiable information — or where an authorized user accesses it for other than authorized purposes. A breach can occur without any data leaving the system; an attacker gaining access to a database they were not authorized to view qualifies, even if they never download a single record.
Data exfiltration, by contrast, requires an actual transfer. The NIST definition specifies "the unauthorized transfer of information from a system." Every exfiltration event constitutes a breach, but many breaches do not involve exfiltration.
Data leakage generally refers to unintentional exposure, such as a misconfigured cloud storage bucket or an employee accidentally emailing sensitive documents to the wrong recipient. The key distinction is intent: exfiltration implies a deliberate act, while leakage can be entirely accidental.
Data loss, as NIST defines it, is "the exposure of proprietary, sensitive, or classified information through either data theft or data leakage." This is a confidentiality concept. Many people assume "data loss" means files were deleted or destroyed, but the formal definition focuses on exposure rather than destruction or unavailability.
One additional term worth noting: data spillage applies exclusively to classified information transferred onto an unauthorized system, primarily in government and national security contexts.
How to Detect and Prevent Data Exfiltration
Detecting and preventing data exfiltration requires layered controls that restrict access and surface suspicious movement of information.
Here are the primary control domains to consider:
Zero Trust Architecture: Enforcing least-privilege access on every request limits the data surface available to any single compromised account. Continuous verification means that even authenticated users cannot freely browse systems outside their role, reducing the volume of data an attacker can reach before triggering a policy violation.
Data Loss Prevention: DLP tools monitor data at rest, in motion, and in use across endpoints, networks, and cloud environments. However, cloud-native transfer methods, like sharing environment backups between tenants, can bypass traditional DLP detection, making cloud-aware configurations a necessity.
Network Monitoring and Traffic Inspection: Watching for unusual outbound data volumes, connections to newly observed external hosts, and the presence of known exfiltration tools like file transfer utilities provides visibility into active attempts. The CISA guide identifies tunneling software and unexpected endpoint-to-endpoint communications as specific indicators to monitor.
User and Entity Behavior Analytics: UEBA builds baseline behavioral profiles for users and entities, then flags deviations like bulk file downloads during unusual hours or data access outside an employee's normal job function. This capability is especially valuable for detecting insider privilege misuse, where the access itself is authorized but the pattern is not.
Endpoint Detection and Response: Because attackers often stage data on endpoints before transmitting it, endpoint-layer monitoring can detect exfiltration preparation, such as compression of large file collections in non-standard directories, before any network transfer occurs.
Identity and Access Controls: Multi-factor authentication, role-based access policies, and systematic access reviews reduce the probability that an attacker or rogue insider can aggregate enough data to make exfiltration worthwhile.
Incident Response Planning: Detection without response has limited value. Incident response playbooks should include specific procedures for identifying the exfiltration mechanism, scoping the data involved, and containing further transfers. Testing these playbooks against MITRE ATT&CK exfiltration techniques helps validate that detection tools and response processes work together under realistic conditions.
Protecting What Leaves
Data exfiltration spans networks, cloud services, email, endpoints, and physical media. That breadth is what makes it difficult to stop with any single control. Organizations that reduce risk most effectively treat data movement as a core security problem, not just an afterthought in breach response. The more clearly teams understand how information is accessed, staged, and transferred, the better positioned they are to detect suspicious activity before losses grow.
Frequently Asked Questions
Get the Latest Email Security Insights
Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.



