Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Exfiltration
  4. >ATTACK-T1567.001
ATTACK-T1567.001Active

Exfiltration to Code Repository

Statement

Adversaries may exfiltrate data to a code repository rather than over their primary command and control channel. Code repositories are often accessible via an API (ex: https://api.github.com). Access to these APIs are often over HTTPS, which gives the adversary an additional level of protection.

Exfiltration to a code repository can also provide a significant amount of cover to the adversary if it is a popular service already used by hosts within the network.

Location

Tactic
Exfiltration

Technique Details

Identifier
ATTACK-T1567.001
Parent Technique
ATTACK-T1567
ATT&CK Page
View on MITRE

Tactics

Exfiltration

Platforms

LinuxmacOSWindowsESXi

Detection

Detection Strategy for Exfiltration to Code Repository

Mitigations

Restrict Web-Based Content: Restricting web-based content involves enforcing policies and technologies that limit access to potentially malicious websites, unsafe downloads, and unauthorized browser behaviors. This can include URL filtering, download restrictions, script blocking, and extension control to protect against exploitation, phishing, and malware delivery. This mitigation can be implemented through the following measures:

Deploy Web Proxy Filtering:

  • Use solutions to filter web traffic based on categories, reputation, and content types.
  • Enforce policies that block unsafe websites or file types at the gateway level.

Enable DNS-Based Filtering:

  • Implement tools to restrict access to domains associated with malware or phishing campaigns.
  • Use public DNS filtering services to enhance protection.

Enforce Content Security Policies (CSP):

  • Configure CSP headers on internal and external web applications to restrict script execution, iframe embedding, and cross-origin requests.

Control Browser Features:

  • Disable unapproved browser features like automatic downloads, developer tools, or unsafe scripting.
  • Enforce policies through tools like Group Policy Management to control browser settings.

Monitor and Alert on Web-Based Threats:

  • Use SIEM tools to collect and analyze web proxy logs for signs of anomalous or malicious activity.
  • Configure alerts for access attempts to blocked domains or repeated file download failures.
SP 800-53
SP800-53-AC-20relatedvia ctid-attack-to-sp800-53
SP800-53-AC-4relatedvia ctid-attack-to-sp800-53
SP800-53-SC-7relatedvia ctid-attack-to-sp800-53
View in graphReport an issue
← Back to Exfiltration
Exfiltration19 controls
ATTACK-T1011Exfiltration Over Other Network MediumATTACK-T1011.001Exfiltration Over BluetoothATTACK-T1020Automated ExfiltrationATTACK-T1020.001Traffic DuplicationATTACK-T1029Scheduled TransferATTACK-T1030Data Transfer Size LimitsATTACK-T1041Exfiltration Over C2 ChannelATTACK-T1048Exfiltration Over Alternative ProtocolATTACK-T1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolATTACK-T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolATTACK-T1048.003Exfiltration Over Unencrypted Non-C2 ProtocolATTACK-T1052Exfiltration Over Physical MediumATTACK-T1052.001Exfiltration over USBATTACK-T1537Transfer Data to Cloud AccountATTACK-T1567Exfiltration Over Web ServiceATTACK-T1567.001Exfiltration to Code RepositoryATTACK-T1567.002Exfiltration to Cloud StorageATTACK-T1567.003Exfiltration to Text Storage SitesATTACK-T1567.004Exfiltration Over Webhook