Cloud-Based Services as Exfil

Attack Tool(s): Gcat, Sneaky Creeper, Gost

Detection Link(s):

  • Network Threat Hunting
  • Firewall Log Analysis
  • Endpoint Analysis
  • Security Information and Event Management (SIEM) Log Analysis