ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: IF004.003
  • Created: 25th July 2024
  • Updated: 28th July 2024
  • Platforms: WindowsLinuxMacOSiOSAndroid
  • Contributor: Ismael Briones-Vilar

Exfiltration via Personal NAS Device

A subject exfiltrates data using an organization-owned device (such as a laptop) by copying the data from the device to a personal Network Attached Storage (NAS) device, which is attached to a network outside of the control of the organization, such as a home network. Later, using a personal device, the subject accesses the NAS to retrieve the exfiltrated data.