Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-4 | Information Flow Enforcement | Protects | T1008 | Fallback Channels |
CA-7 | Continuous Monitoring | Protects | T1008 | Fallback Channels |
CM-2 | Baseline Configuration | Protects | T1008 | Fallback Channels |
CM-6 | Configuration Settings | Protects | T1008 | Fallback Channels |
CM-7 | Least Functionality | Protects | T1008 | Fallback Channels |
SC-7 | Boundary Protection | Protects | T1008 | Fallback Channels |
SI-3 | Malicious Code Protection | Protects | T1008 | Fallback Channels |
SI-4 | System Monitoring | Protects | T1008 | Fallback Channels |
azure_firewall | Azure Firewall | technique_scores | T1008 | Fallback Channels |