T1001.001 Junk Data Mappings

Adversaries may add junk data to protocols used for command and control to make detection more difficult.(Citation: FireEye SUNBURST Backdoor December 2020) By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise analyzing the traffic. Examples may include appending/prepending data with junk characters or writing junk characters between significant characters.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CA-07 Continuous Monitoring mitigates T1001.001 Junk Data
CM-06 Configuration Settings mitigates T1001.001 Junk Data
SI-03 Malicious Code Protection mitigates T1001.001 Junk Data
CM-02 Baseline Configuration mitigates T1001.001 Junk Data
SI-04 System Monitoring mitigates T1001.001 Junk Data
AC-04 Information Flow Enforcement mitigates T1001.001 Junk Data
SC-07 Boundary Protection mitigates T1001.001 Junk Data

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.hacking.variety.Other Other related-to T1001.001 Junk Data