Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
amazon_guardduty | Amazon GuardDuty | technique_scores | T1041 | Exfiltration Over C2 Channel |
aws_iot_device_defender | AWS IoT Device Defender | technique_scores | T1041 | Exfiltration Over C2 Channel |
aws_network_firewall | AWS Network Firewall | technique_scores | T1041 | Exfiltration Over C2 Channel |