Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Exfiltration Over Web Service Exfiltration Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than thei… Edit
Exfiltration Over Web Service: Exfiltration Over Webhook Exfiltration Adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and con… Edit
Exfiltration Over Web Service: Exfiltration to Cloud Storage Exfiltration Adversaries may exfiltrate data to a cloud storage service rather than over their primary command an… Edit
Exfiltration Over Web Service: Exfiltration to Code Repository Exfiltration Adversaries may exfiltrate data to a code repository rather than over their primary command and cont… Edit
Exfiltration Over Web Service: Exfiltration to Text Storage Sites Exfiltration Adversaries may exfiltrate data to text storage sites instead of their primary command and control c… Edit