Insiders as well as threat actors having GUI access to system can leverage this technique to create Visual Studio Tunnel links to exfiltrate the data.
This will generate a microsoft tunnel link proxying the traffic to the local binded port.
CTRL + SHIFT + P, Searching for Forward a port. Click on forward the port and provide a local port which is required to be exposed over the internet.
Insider threat, external threat actor will be able to expose the local system over the internet and exfiltrate the sensitive files.
CTRL + SHIFT + P, Searching for Foreward a port, Click on forward the port and provide a local port on which a local server is running. An example, 'python -m http.server 8080'.
Threat actors can host malicious binaries/payloads locally and can use Microsoft Tunnels domains to download them onto the victim machine.
CTRL + SHIFT + P, Searching for Foreward a port, Click on forward the port and provide a local port on which a local server is running. An example, 'python -m http.server 8080'.