Data Exfiltration
Data Exfiltration
Adversaries may steal data from an application’s environment, such as sensitive customer records, intellectual property, or operational intelligence. This can happen via direct data dumps, continuous network egress, or by siphoning data through cloud services. Once exfiltrated, stolen information can be sold, used for extortion, or leveraged to enable further attacks on related targets.