T1570 - Lateral Tool Transfer
Tattiche:
Lateral Movement
Lateral Movement
Piattaforme:
ESXi Linux macOS Windows
ESXi Linux macOS Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may transfer tools or other files between systems in a compromised environment. Once brought into the victim environment (i.e., [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) files may then be copied from one system to another to stage adversary tools or other files over the course of an operation.
Adversaries may copy files between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) to connected network shares or with authenticated connections via [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001).(Citation: Unit42 LockerGoga 2019)
Files can also be transferred using native or otherwise present tools on the victim system, such as scp, rsync, curl, sftp, and [ftp](https://attack.mitre.org/software/S0095). In some cases, adversaries may be able to leverage [Web Service](https://attack.mitre.org/techniques/T1102)s such as Dropbox or OneDrive to copy files from one machine to another via shared, automatically synced folders.(Citation: Dropbox Malware Sync)
Adversaries may copy files between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) to connected network shares or with authenticated connections via [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001).(Citation: Unit42 LockerGoga 2019)
Files can also be transferred using native or otherwise present tools on the victim system, such as scp, rsync, curl, sftp, and [ftp](https://attack.mitre.org/software/S0095). In some cases, adversaries may be able to leverage [Web Service](https://attack.mitre.org/techniques/T1102)s such as Dropbox or OneDrive to copy files from one machine to another via shared, automatically synced folders.(Citation: Dropbox Malware Sync)
Usato da Attori (19)
Turla
Nation-state
Nation-state
APT32
Nation-state
Nation-state
WIZARD SPIDER
Nation-state
Nation-state
FIN10
Unknown
Unknown
APT41
Nation-state
Nation-state
GALLIUM
Unknown
Unknown
Aoqin Dragon
Unknown
Unknown
Volt Typhoon
Unknown
Unknown
UNC3886
Unknown
Unknown
Medusa Group
Unknown
Unknown
Velvet Ant
Unknown
Unknown
Sandworm Team
Unknown
Unknown
Ember Bear
Unknown
Unknown
Magic Hound
Unknown
Unknown
Storm-1811
Unknown
Unknown
Chimera
Unknown
Unknown
INC Ransom
Unknown
Unknown
BlackByte
Unknown
Unknown
Agrius
Unknown
Unknown
Malware (20)
Stuxnet other
Havoc other
Emotet other
Olympic Destroyer other
BlackCat other
Lucifer other
LockerGoga other
DustySky other
Netwalker other
WannaCry other
VIRTUALPIE other
Shamoon other
BlackByte Ransomware other
IPsec Helper other
OutSteel other
VIRTUALPITA other
INC Ransomware other
HermeticWizard other
Impacket tool
BITSAdmin tool
Metadata
| MITRE ID: | T1570 |
| STIX ID: | attack-pattern--bf90d72c-c00b-... |
| Piattaforme: | ESXi, Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 21/04/2026 04:00 |