Skip to main content

πŸ—„οΈ Data Collection: Explained

Once access is established and the attacker has escalated privileges, the next step is often data collectionβ€”locating, staging, and preparing valuable data for exfiltration or analysis. This is a high-value phase where adversaries pursue specific intelligence goals aligned with the campaign's purpose.


🎯 Why Data Collection Matters​

This stage transforms access into actionable intelligence.

  • πŸ“œ Intellectual property can be copied.
  • 🧾 Credentials and tokens can be reused.
  • πŸ” Secrets in memory or config files can provide deeper access.
  • πŸ“¦ Archives or databases may contain the crown jewels.

πŸ“‚ What Kind of Data is Targeted?​

CategoryExamplesMITRE ATT&CK IDs
πŸ” Credentials.git-credentials, secrets.xml, LSASST1555, T1003, T1552
🧾 DocumentsContracts, R&D, strategy docsT1005, T1119
πŸ’³ Financial DataInvoices, payment records, banking filesT1005, T1213
πŸ› οΈ Configs/SecretsAPI keys, SSH keys, .env filesT1552.001, T1552.004
🧠 Behavioral LogsKeystrokes, screen captures, clipboardT1056, T1113, T1115
πŸ“Έ MediaVideo/Audio/Photos (esp. in espionage)T1123, T1125
πŸ›‘οΈ Security ArtifactsAV logs, SIEM configs, firewall rulesT1083, T1518

πŸ” Collection Techniques​

TechniqueDescription
🧠 Memory scrapingGrabbing secrets from RAM or process memory
πŸ“ Directory traversalRecursively searching home dirs and shares
πŸ§ͺ Keyword scanningLooking for "password", "confidential", etc.
πŸ—„οΈ Registry scrapingFor credential remnants or configuration info
πŸ“¦ Local stagingArchiving data (ZIP, RAR) before exfil
πŸ“‹ Clipboard/keylog monitoringCapturing transient but sensitive user input

βš–οΈ OPSEC & Noise Considerations​

ConcernDescription
πŸ”Š File Access LogsBulk reads can trigger DLP or AV logging
🚨 EDR DetectionSuspicious API calls (e.g., LSASS access)
πŸ”„ Collection LoopsMay indicate automation, risk triggering SIEM
πŸ•΅οΈβ€β™‚οΈ Staging CluesUse of C:\Users\Public is often monitored

πŸ› οΈ Common Tools​

Tool/FrameworkPurpose
🦈 MimikatzCredentials from memory, DPAPI
🧬 SharpHoundAD recon, collects user/group data
πŸ“¦ WinRAR/7-ZipStaging files for exfil
🧠 PowerViewFile share enumeration and discovery
πŸͺŸ SeatbeltPulls system artifacts and secrets
πŸ›’ RcloneAutomated sync to cloud exfil targets

πŸŽ“ Real-World Examples​

IncidentData Targeted
SolarWinds BreachRed Team reports, credentials
Equifax BreachSSNs, PII from DBs
Conti Playbook LeaksPowerShell scripts for ZIP staging

πŸ”š Summary​

Data collection is the bridge between access and impact.

  • It prepares for exfiltration, intelligence analysis, or future compromise.
  • Defensive teams must monitor usage patterns, not just tool signatures.

🧠 If an attacker is reading your documentation, configs, and exportsβ€”you're in the collection phase. Your secrets are next.