Infringement
Disruption of Business Operations
Excessive Personal Use
Exfiltration via Email
Exfiltration via Media Capture
Exfiltration via Messaging Applications
Exfiltration via Other Network Medium
Exfiltration via Physical Medium
- Exfiltration via Bring Your Own Device (BYOD)
- Exfiltration via Disk Media
- Exfiltration via Floppy Disk
- Exfiltration via New Internal Drive
- Exfiltration via Physical Access to System Drive
- Exfiltration via Physical Documents
- Exfiltration via Target Disk Mode
- Exfiltration via USB Mass Storage Device
- Exfiltration via USB to Mobile Device
- Exfiltration via USB to USB Data Transfer
Exfiltration via Web Service
Harassment and Discrimination
Inappropriate Web Browsing
Installing Unapproved Software
Misappropriation of Funds
Non-Corporate Device
Providing Access to a Unauthorized Third Party
Public Statements Resulting in Brand Damage
Sharing on AI Chatbot Platforms
Theft
Unauthorized Changes to IT Systems
Unauthorized Printing of Documents
Unauthorized VPN Client
Unlawfully Accessing Copyrighted Material
- ID: IF006
- Created: 31st May 2024
- Updated: 14th June 2024
- Platforms: Windows, Linux, MacOS
- Contributor: The ITM Team
Unauthorized Printing of Documents
A subject exfiltrates information by printing it to paper or other physical medium.
Subsections
ID | Name | Description |
---|---|---|
IF006.001 | Printing of Documents with Personal Printer | A subject prints a document using a printer they own, physically exfiltrating the information. |
IF006.002 | Printing of Documents with Work Printer | A subject prints a document using a printer owned by the organization, with the intent to physically exfiltrate the information. |
Prevention
ID | Name | Description |
---|---|---|
PV014 | Disable Printing, Windows | Group Policy can be used to disable printing for specific user accounts. |
Detection
ID | Name | Description |
---|---|---|
DT033 | Closed-Circuit Television | CCTV can be used to observe activity within or around a site. This control can help to detect preparation or infringement activities and record it to a video file. |
DT006 | Installed Printers via Registry | The Windows Registry stores information about installed printers and their configurations. The following registry keys can be useful to investigators:
|
DT005 | Print Spooler Service | The Spool files can typically be found in the following directory: A spool file with a The spool file is stored in the spool directory associated with the printer until the print job is completed. Once the print job is finished and successfully printed, the .SPL file is typically deleted. A job control language file with a The .SHD file is also stored in the spool directory during the print job's processing. Unlike the .SPL file, the .SHD file can sometimes persist longer, but it is generally deleted after the print job is completed or upon system cleanup. If the files are not present, it may be possible to use file carving techniques on a disk image to retrieve .SPL and .SHD files. Content and metadata analysis can be conducted to identify timestamps, document names, and user names. |
DT007 | Printed Documents via Event Logs | Windows logs print job activities to Event logs, containing information such as job creation, completion, errors, and adding or deleting printer devices.
Event ID 307 - A document was printed. Event ID 310 - A document failed to print. Event ID 701 - Printer status changed. Event ID 703 - Printer object added. Event ID 804 - Document resumed for printing. Event ID 805 - Printer driver was installed.
Event ID 808 - Printer driver was installed. Event ID 843 - The print spooler failed to import the printer driver. Event ID 1000 - Document print started. Event ID 1001 - Document was printed. Event ID 1100 - Printer was added. Event ID 1101 - Printer was deleted. Event ID 1200 - Print spooler service started. Event ID 1201 - Print spooler service stopped. |