Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, or impersonating legitimate protocols.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-4 | Information Flow Enforcement | Protects | T1001 | Data Obfuscation |
CA-7 | Continuous Monitoring | Protects | T1001 | Data Obfuscation |
CM-2 | Baseline Configuration | Protects | T1001 | Data Obfuscation |
CM-6 | Configuration Settings | Protects | T1001 | Data Obfuscation |
SC-7 | Boundary Protection | Protects | T1001 | Data Obfuscation |
SI-3 | Malicious Code Protection | Protects | T1001 | Data Obfuscation |
SI-4 | System Monitoring | Protects | T1001 | Data Obfuscation |
action.hacking.variety.Use of backdoor or C2 | Use of Backdoor or C2 channel | related-to | T1001 | Data Obfuscation |
action.hacking.vector.Backdoor or C2 | Backdoor or command and control channel | related-to | T1001 | Data Obfuscation |
action.malware.variety.Unknown | Unknown | related-to | T1001 | Data Obfuscation |
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1001.001 | Junk Data | 9 |
T1001.003 | Protocol Impersonation | 8 |
T1001.002 | Steganography | 8 |