The document discusses how hackers exfiltrate sensitive data from networks. It describes common exfiltration scenarios used by advanced persistent threats, point of sale malware like BlackPOS, and financial malware like Zeus. These scenarios involve infecting systems, moving laterally through the network, using novel command and control techniques, and extracting data using various transport protocols, encodings, and encryption. The document recommends detecting exfiltration by understanding the targeted data, common data formats, encoding methods, and traffic patterns used by different malware varieties.