Back to Glossary
Attack Types Cybersecurity Glossary

Exfiltration

The unauthorized transfer of data from a system or network to a location controlled by an attacker.

Full Definition

Data exfiltration is the unauthorized copying, transfer, or retrieval of data from a victim's system to a location controlled by a threat actor. It represents the culmination of most data breach attacks and is a primary objective in both espionage and financially motivated intrusions.

Exfiltration techniques vary widely: HTTP/S transfers to attacker-controlled servers, DNS tunneling, encrypted archive uploads, email forwarding, and cloud storage abuse (uploading to Dropbox, Google Drive, etc.) are all common methods designed to blend in with normal traffic.

For infostealer malware, exfiltration is automated and near-instantaneous — credentials, browser cookies, crypto wallet files, and documents are harvested and transmitted to C2 infrastructure within minutes of infection. Detecting exfiltration requires deep packet inspection, data loss prevention (DLP) tools, and network traffic anomaly detection.

Related Terms

Threat Intelligence Platform

Monitor Your Exposure on Whiteintel

Understanding threats is the first step. Whiteintel continuously monitors dark web sources, stealer logs, and breach databases so you know the moment your organization's data is at risk.

Ready to Protect Your Digital Assets?

Start monitoring your organization's exposure to credential leaks and dark web threats today.