T1074 - Data Staged

Tattiche:
Collection
Piattaforme:
Windows IaaS Linux macOS +1
Rilevamento:
Not specified
Description:
Adversaries may stage collected data in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location.(Citation: PWC Cloud Hopper April 2017)

In cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration. An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and stage data in that instance.(Citation: Mandiant M-Trends 2020)

Adversaries may choose to stage data from a victim network in a centralized location prior to Exfiltration to minimize the number of connections made to their C2 server and better evade detection.
Sub-tecniche (2)
ID ATT&CK Azioni
T1074.001 Local Data Staging
T1074.002 Remote Data Staging
Metadata
MITRE ID: T1074
STIX ID: attack-pattern--7dd95ff6-712e-...
Piattaforme: Windows, IaaS, Linux, macOS, ESXi
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00