T1102.003 One-Way Communication

Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the Web service channel. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.

Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.AE-02.01 Event analysis and detection Mitigates T1102.003 One-Way Communication
Comments
This diagnostic statement provides for implementation of methods to block similar future attacks via security tools such as antivirus and IDS/IPS to provide protection against threats and exploitation attempts.
References
    DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.003 One-Way Communication
    Comments
    Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
    References
      DE.CM-01.05 Website and service blocking Mitigates T1102.003 One-Way Communication
      Comments
      This diagnostic statement helps mitigate web service techniques through the implementation of tools and measures to detect and block access to unauthorized, inappropriate, or malicious websites and services.
      References
        PR.IR-01.03 Network communications integrity and availability Mitigates T1102.003 One-Way Communication
        Comments
        This diagnostic statement protects against One-Way Communication through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
        References

          NIST 800-53 Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          CA-07 Continuous Monitoring mitigates T1102.003 One-Way Communication
          CM-06 Configuration Settings mitigates T1102.003 One-Way Communication
          SI-03 Malicious Code Protection mitigates T1102.003 One-Way Communication
          CM-02 Baseline Configuration mitigates T1102.003 One-Way Communication
          CM-07 Least Functionality mitigates T1102.003 One-Way Communication
          SI-04 System Monitoring mitigates T1102.003 One-Way Communication
          AC-04 Information Flow Enforcement mitigates T1102.003 One-Way Communication
          SC-07 Boundary Protection mitigates T1102.003 One-Way Communication