Data Exfiltration: What it is, warning signs, and how to stop data from leaving your network

Data Exfiltration

What it is

Data exfiltration is the unauthorized transfer of your data out of your device or network—quietly slipping customer records, passwords, designs, or finances to an attacker. It’s the punchline of many breaches: get in, get data out, cash in.

Why it matters

Stolen data fuels identity theft, fraud, and extortion (including “double-extortion” ransomware). Even small leaks can trigger fines, lost customers, and public trust damage.

How attackers pull it off

  • Malware & ransomware: plant stealers, then zip and send files out.

  • Phishing & social engineering: trick users into uploading or sharing.

  • Abused access: compromised accounts, API tokens, or misconfigured cloud storage.

  • Covert channels: HTTPS to look legit, DNS/HTTP beacons, cloud drives, or personal email.

Signs to watch

  • Repeated outbound connections to odd domains/IPs, especially at night

  • Sudden spikes in upload traffic or big archives leaving the network

  • New mail forwarding rules, unknown OAuth app connections

  • Security tools disabled, or logs conveniently missing

If you suspect a leak 

  1. Isolate affected systems; preserve logs and memory—don’t wipe yet.

  2. Block destinations (domains/IPs/accounts) and kill suspicious sessions/tokens.

  3. From a clean device, rotate credentials and keys (admins, APIs, cloud).

  4. Start scope & impact: what data, whose data, how much, and when.

  5. Engage IR/Sec and notify stakeholders; follow legal/regulatory steps.

Prevent it 

  • MFA everywhere; least-privilege access and regular access reviews.

  • Patch fast on internet-facing apps; monitor endpoints with EDR.

  • Encrypt sensitive data at rest and in transit; disable public buckets/shares.

  • Egress controls: DNS filtering, proxy allowlists, DLP rules for uploads and email.

  • Detect early: alerts for large downloads, mass file access, new forwarders/OAuth apps.

  • Train people: verify unusual data requests out of band; beware of urgent “executive” asks.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • APT (Advanced Persistent Threat)

        What it is An APT is a long-game, targeted attack. Skilled attackers quietly break in, move sideways through the network, and stay hidden for weeks or months to steal sensitive data—not to make noise. Think careful recon, staged break-ins, and ...
      • NDR (Network Detection And Response)

        What it is Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your ...
      • EDR (Endpoint Detection and Response)

        What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
      • Data Breach Prevention

        Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...
      • Data Breach

        What it is A data breach is when someone gets into a company’s systems without permission and steals sensitive info—customer names, emails, passwords, payment details, medical records, and more. For overview: see our data breach guide How it happens ...