ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: IF002.008
  • Created: 26th July 2024
  • Updated: 26th July 2024
  • Platforms: iOSAndroid
  • Contributor: The ITM Team

Exfiltration via USB to Mobile Device

The subject uses a USB cable, and any relevant software if required, to transfer files or data from one system to a mobile device. This device is then taken outside of the organization's control, where the subject can later access the contents.