Cloud based services like Gmail, Twitter and Facebook have emerged as another vector for data exfiltration and command and control (C2) attacks. These services allow easy API driven account access and/or free cloud storage (eg. Google Drive, DropBox) that can easily be used for exfiltration of confidential information.