T1041 Exfiltration Over C2 Channel Mappings

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-16 Security and Privacy Attributes Protects T1041 Exfiltration Over C2 Channel
AC-02 Account Management Protects T1041 Exfiltration Over C2 Channel
AC-20 Use of External Systems Protects T1041 Exfiltration Over C2 Channel
AC-23 Data Mining Protection Protects T1041 Exfiltration Over C2 Channel
AC-03 Access Enforcement Protects T1041 Exfiltration Over C2 Channel
AC-04 Information Flow Enforcement Protects T1041 Exfiltration Over C2 Channel
AC-06 Least Privilege Protects T1041 Exfiltration Over C2 Channel
CA-03 Information Exchange Protects T1041 Exfiltration Over C2 Channel
CA-07 Continuous Monitoring Protects T1041 Exfiltration Over C2 Channel
SA-08 Security and Privacy Engineering Principles Protects T1041 Exfiltration Over C2 Channel
SA-09 External System Services Protects T1041 Exfiltration Over C2 Channel
SC-13 Cryptographic Protection Protects T1041 Exfiltration Over C2 Channel
SC-28 Protection of Information at Rest Protects T1041 Exfiltration Over C2 Channel
SC-31 Covert Channel Analysis Protects T1041 Exfiltration Over C2 Channel
SC-07 Boundary Protection Protects T1041 Exfiltration Over C2 Channel
SI-03 Malicious Code Protection Protects T1041 Exfiltration Over C2 Channel
SI-04 System Monitoring Protects T1041 Exfiltration Over C2 Channel
SR-04 Provenance Protects T1041 Exfiltration Over C2 Channel