1. Archive Collected Data. 2. Audio Capture. 3. Automated Collection. 4. Clipboard Data. 5. Data from Information Repositories. 6. Data from Local System. 7. Data from Network Shared Drive. 8. Data from Removable Media. 9. Data Staged. 10. Input Capture. 11. Man-in-the-Middle (MiTM) Attacks. 12. Screen Capture. 13. Video Capture.
Command and Control – macOS
1. Application Layer Protocol. 2. Communication Through Removable Media. 3. Data Encoding. 4. Data Obfuscation. 5. Dynamic Resolution. 6. Encrypted Channel. 7. Fallback Channels. 8. Ingress Tool Transfer 9. Multi-Stage Channels. 10. Non-Application Layer Protocols. 11. Non-Standard Ports. 12. Protocol Tunnelling. 13. Proxy. 14. Remote Access Software. 15. Traffic Signalling. 16. Web Services.
Exfiltration – macOS
1. Automated Exfiltration. 2. Data Transfer Size Limits. 3. Exfiltration over Alternative Protocols. 4. Exfiltration over C2 Channel. 5. Exfiltration over other Network Medium. 6. Exfiltration over Physical Medium. 7. Exfiltration over Web Service. 8. Scheduled Cronjobs.
Impact of macOS Attacks
1. Account Access Removal. 2. Data Destruction. 3. Data Encrypted for Impact. 4. Data Manipulation. 5. Defacement. 6. Disk Wipe. 7. Endpoint Denial of Service. 8. Firmware Corruption. 9. Inhibit System Recovery. 10. Network Denial of Service. 11. Resource Hijacking. 12. System Shutdown/Reboot.