For more information on the topics discussed in this chapter, please visit the following links: https://7io.net/2015/09/30/data-exfiltration-dnsteal/ https://n0where.net/data-exfiltration-over-dns-request-covert-channel-dnsexfiltrator https://github.com/m57/dnsteal https://blog.trendmicro.com/trendlabs-security-intelligence/data-exfiltration-in-targeted-attacks/ https://www.techopedia.com/definition/14682/data-exfiltration https://www.sciencedirect.com/science/article/pii/S2212017313005033