Infringement
Codebase Integrity Compromise
Data Loss
Delegated Execution via Artificial Intelligence Agents
Denial of Service
Disruption of Business Operations
Excessive Personal Use
Exfiltration via Email
Exfiltration via Media Capture
Exfiltration via Messaging Applications
Exfiltration via Other Network Medium
Exfiltration via Physical Medium
- Exfiltration via Bring Your Own Device (BYOD)
- Exfiltration via Disk Media
- Exfiltration via Floppy Disk
- Exfiltration via New Internal Drive
- Exfiltration via Physical Access to System Drive
- Exfiltration via Physical Documents
- Exfiltration via Target Disk Mode
- Exfiltration via USB Mass Storage Device
- Exfiltration via USB to Mobile Device
- Exfiltration via USB to USB Data Transfer
Exfiltration via Screen Sharing
Exfiltration via SMS/MMS
Exfiltration via Web Service
External Credential Sharing
Harassment and Discrimination
Inappropriate Web Browsing
Installing Malicious Software
Installing Unapproved Software
Internal Credential Sharing
Misappropriation of Funds
Non-Corporate Device
Providing Access to a Unauthorized Third Party
Public Statements Resulting in Brand Damage
Regulatory Non-Compliance
Sharing on AI Chatbot Platforms
Theft
Unauthorized Changes to IT Systems
Unauthorized Presence in Restricted Physical Areas
Unauthorized Printing of Documents
Unauthorized VPN Client
Unlawfully Accessing Copyrighted Material
- ID: IF004.008
- Created: 06th April 2026
- Updated: 06th April 2026
- Contributor: The ITM Team
Exfiltration via API
A subject may exfiltrate organizational data through direct interaction with application programming interfaces (APIs), leveraging HTTP/S-based service endpoints to transmit sensitive information outside of the organization’s controlled environment. This method typically involves programmatic data transfer using scripts, command-line tools, or software development kits (SDKs), rather than user-facing web interfaces.
In this infringement method, the subject authenticates to an external or unauthorized internal API using credentials such as API keys, OAuth tokens, or session tokens, and submits data via structured requests (e.g., POST, PUT). These APIs may belong to legitimate third-party services (e.g., cloud platforms, SaaS applications) or attacker-controlled infrastructure designed to receive and store exfiltrated data.
Unlike platform-driven exfiltration (e.g., uploading files via a web interface), API-based exfiltration is typically automated, scalable, and capable of operating without generating browser artifacts. This allows the subject to transfer large volumes of data, segment payloads across multiple requests, or embed exfiltration within otherwise legitimate application traffic.
This technique is particularly effective in environments where API traffic is common and trusted, and where inspection of request payloads, headers, or authentication patterns is limited.