Your javascript is disabled. Click the following link to the article.
Cyber Services Snapshot: Examining Data Exfiltration