We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Behavior:Linux/SuspiciousTransferOut.A
Aliases: No associated aliases
Summary
This is a behavioral monitoring signature for suspicious activities described in the MITRE ATT&CK technique T1048 Exfiltration Over Alternative Protocol
If you have cloud-delivered protection, your device gets the latest defenses against new and unknown threats. If you don't have this feature enabled, update your antimalware definitions and run a full scan to remove this threat.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.