What is Data from Local System?
Adversaries may search local system sources, such as file systems, configuration files, and local databases, to find files of interest and sensitive data prior to exfiltration. Adversaries may do this using a command shell (e.g., cmd) or scripting language (e.g., PowerShell) to search through the local file system, registry, and other data stores. Targeting of local data is common in both financially motivated attacks and espionage campaigns. Attackers typically search for documents containing sensitive business information, source code, customer data, intellectual property, financial records, and credentials. After identifying target files, attackers typically compress and encrypt the data before exfiltration to reduce transfer size and evade data loss prevention tools that inspect file contents. Understanding data collection behaviors is essential for building effective data-centric security monitoring.
“Data from Local System is documented as technique T1005 in the MITRE ATT&CK knowledge base under the Collection tactic. Detection requires visibility into XDR, SIEM telemetry.”