Website
transfer.sh
Tags
Phishing Exfiltration Download
Phishing
Attackers can upload malicious files to transfer.sh and share the direct download link to users.
Command and Control
None
Exfiltration
Attackers can exfiltrate data using transfer.sh either using the command line or through uploading files and sharing the link to themselves to download the exfiltrated data.
Download
Attackers can keep their tools stored on transfer.sh and when required, use the custom link to download.
Service Provider
Transfer.sh
Created: 2022-01-20
Last Update: 2022-01-20
Credits: Adithya -@ravooriadithya