T1001.003 Protocol or Service Impersonation

Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic.

Adversaries may impersonate a fake SSL/TLS handshake to make it look like subsequent traffic is SSL/TLS encrypted, potentially interfering with some security tooling, or to make the traffic look like it is related with a trusted entity.

Adversaries may also leverage legitimate protocols to impersonate expected web traffic or trusted services. For example, adversaries may manipulate HTTP headers, URI endpoints, SSL certificates, and transmitted data to disguise C2 communications or mimic legitimate services such as Gmail, Google Drive, and Yahoo Messenger.(Citation: ESET Okrum July 2019)(Citation: Malleable-C2-U42)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.AE-02.01 Event analysis and detection Mitigates T1001.003 Protocol or Service Impersonation
Comments
This diagnostic statement provides for implementation of methods to block similar future attacks via security tools such as antivirus and IDS/IPS to provide protection against threats and exploitation attempts.
References
    DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.003 Protocol or Service Impersonation
    Comments
    Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
    References
      PR.IR-01.03 Network communications integrity and availability Mitigates T1001.003 Protocol or Service Impersonation
      Comments
      This diagnostic statement protects against Protocol or Service Impersonation through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
      References

        NIST 800-53 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        CA-07 Continuous Monitoring mitigates T1001.003 Protocol or Service Impersonation
        CM-06 Configuration Settings mitigates T1001.003 Protocol or Service Impersonation
        SI-03 Malicious Code Protection mitigates T1001.003 Protocol or Service Impersonation
        CM-02 Baseline Configuration mitigates T1001.003 Protocol or Service Impersonation
        SI-04 System Monitoring mitigates T1001.003 Protocol or Service Impersonation
        AC-04 Information Flow Enforcement mitigates T1001.003 Protocol or Service Impersonation
        SC-07 Boundary Protection mitigates T1001.003 Protocol or Service Impersonation

        VERIS Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        action.hacking.variety.Other Other related-to T1001.003 Protocol or Service Impersonation