T1008 Fallback Channels Mappings

Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-4 Information Flow Enforcement Protects T1008 Fallback Channels
CA-7 Continuous Monitoring Protects T1008 Fallback Channels
CM-2 Baseline Configuration Protects T1008 Fallback Channels
CM-6 Configuration Settings Protects T1008 Fallback Channels
CM-7 Least Functionality Protects T1008 Fallback Channels
SC-7 Boundary Protection Protects T1008 Fallback Channels
SI-3 Malicious Code Protection Protects T1008 Fallback Channels
SI-4 System Monitoring Protects T1008 Fallback Channels
azure_firewall Azure Firewall technique_scores T1008 Fallback Channels
Comments
This control's threat intelligence-based filtering feature can be enabled to alert and deny traffic from/to known malicious IP addresses and domains. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed. Because this protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References