Preparation
Archive Data
Authorization Token Staging
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Delegated Preparation via Artificial Intelligence Agents
Device Mounting
Email Collection
External Media Formatting
File Download
File Exploration
Hardware-Based Remote Access (IP-KVM)
Impersonation
Increase Privileges
IT Ticketing System Exploration
Joiner
Media Capture via External Device
Mover
Network Scanning
On-Screen Data Collection
Oversight Circumvention and Control Degradation
Persistent Access via Bots
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Remote Desktop (RDP)
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installation of Dark Web-Capable Browsers
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
VPN Usage
- ID: PR025
- Created: 02nd December 2024
- Updated: 02nd December 2024
- Contributor: The ITM Team
File Download
The subject downloads one or more files to a system to access the file or prepare for exfiltration.
Subsections (8)
| ID | Name | Description |
|---|---|---|
| PR025.008 | File Download via API or Application Integration | The subject uses APIs or integrated applications (e.g., Git clients, SaaS integrations, or custom scripts) to pull files from external systems. This includes automated retrieval from repositories, data platforms, or third-party services.
This behavior is often tied to legitimate workflows but may be repurposed to extract or stage data at scale, particularly where API access is insufficiently monitored. |
| PR025.001 | File Download via BITS | The subject leverages the Windows Background Intelligent Transfer Service (BITS) to download files from external or internal sources. BITS is a native Windows component designed for asynchronous, throttled file transfers, commonly used by the operating system and enterprise update mechanisms. Its trusted status and ability to operate in the background make it an attractive method for covert file retrieval.
Because BITS jobs can persist across reboots and operate under legitimate system processes, their misuse can blend with normal system activity, reducing visibility and delaying detection. |
| PR025.002 | File Download via Browser | The subject downloads files using a web browser (e.g., Chrome, Edge, Firefox) from external or internal web resources. This is the most common and lowest-friction method of file acquisition, typically requiring no additional tooling or elevated privileges.
Browser-based downloads are often logged via proxy, CASB, or endpoint telemetry, but may still present challenges in environments with encrypted traffic or limited content inspection. This behavior is frequently associated with early-stage preparation, including retrieval of tools, scripts, or datasets from public repositories, file-sharing platforms, or personal cloud storage. |
| PR025.004 | File Download via Cloud Storage Synchronization | The subject retrieves files by syncing with cloud storage platforms such as OneDrive, Google Drive, or Dropbox. Files may be selectively synced or fully mirrored to the endpoint.
This method blends with legitimate enterprise workflows and may evade traditional download detection mechanisms, especially where cloud services are sanctioned. It also enables large-scale or continuous ingestion of data with minimal user interaction. |
| PR025.003 | File Download via Command-Line Utilities | The subject uses command-line tools such as
Command-line downloads often indicate a higher level of intent or technical capability and may bypass browser-based controls. They are commonly used to retrieve payloads, stage tooling, or integrate downloads into scripted workflows. |
| PR025.005 | File Download via Email | The subject retrieves files from email systems, typically via attachments or embedded download links within corporate or personal email accounts. This includes access through thick clients (e.g., Outlook) or webmail interfaces.
Email-based file retrieval is a common and low-friction method for introducing external content into the environment. Attachments may originate from external senders, personal accounts, or previously staged communications. |
| PR025.006 | File Download via Messaging Platforms | The subject retrieves files from enterprise or consumer messaging platforms such as Teams, Slack, or other collaboration tools. Files may be shared directly in chats, channels, or through integrated file storage components.
Messaging platforms often operate as semi-trusted environments, particularly when enterprise-approved, allowing file transfers to blend with legitimate collaboration. Where personal or unsanctioned messaging platforms are used, visibility may be significantly reduced or absent. |
| PR025.007 | File Download via Remote Access or Transfer Tools | The subject downloads files through remote session tools or file transfer mechanisms such as RDP drive mapping, SCP, SFTP, or remote desktop clipboard/file transfer features. |