Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Exfiltration
  4. >ATTACK-T1030
ATTACK-T1030Active

Data Transfer Size Limits

Statement

An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.

Location

Tactic
Exfiltration

Technique Details

Identifier
ATTACK-T1030
ATT&CK Page
View on MITRE

Tactics

Exfiltration

Platforms

LinuxmacOSWindowsESXi

Detection

Detection Strategy for Data Transfer Size Limits and Chunked Exfiltration

Mitigations

Network Intrusion Prevention: Use intrusion detection signatures to block traffic at network boundaries.

SP 800-53
SP800-53-AC-4relatedvia ctid-attack-to-sp800-53
SP800-53-CA-7relatedvia ctid-attack-to-sp800-53
SP800-53-CM-2relatedvia ctid-attack-to-sp800-53
SP800-53-CM-6relatedvia ctid-attack-to-sp800-53
SP800-53-SC-7relatedvia ctid-attack-to-sp800-53
View in graphReport an issue
← Back to Exfiltration
Exfiltration19 controls
ATTACK-T1011Exfiltration Over Other Network MediumATTACK-T1011.001Exfiltration Over BluetoothATTACK-T1020Automated ExfiltrationATTACK-T1020.001Traffic DuplicationATTACK-T1029Scheduled TransferATTACK-T1030Data Transfer Size LimitsATTACK-T1041Exfiltration Over C2 ChannelATTACK-T1048Exfiltration Over Alternative ProtocolATTACK-T1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolATTACK-T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolATTACK-T1048.003Exfiltration Over Unencrypted Non-C2 ProtocolATTACK-T1052Exfiltration Over Physical MediumATTACK-T1052.001Exfiltration over USBATTACK-T1537Transfer Data to Cloud AccountATTACK-T1567Exfiltration Over Web ServiceATTACK-T1567.001Exfiltration to Code RepositoryATTACK-T1567.002Exfiltration to Cloud StorageATTACK-T1567.003Exfiltration to Text Storage SitesATTACK-T1567.004Exfiltration Over Webhook