T1008 Fallback Channels Mappings

Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-4 Information Flow Enforcement Protects T1008 Fallback Channels
CA-7 Continuous Monitoring Protects T1008 Fallback Channels
CM-2 Baseline Configuration Protects T1008 Fallback Channels
CM-6 Configuration Settings Protects T1008 Fallback Channels
CM-7 Least Functionality Protects T1008 Fallback Channels
SC-7 Boundary Protection Protects T1008 Fallback Channels
SI-3 Malicious Code Protection Protects T1008 Fallback Channels
SI-4 System Monitoring Protects T1008 Fallback Channels
action.hacking.variety.Use of backdoor or C2 Use of Backdoor or C2 channel related-to T1008 Fallback Channels
action.hacking.vector.Backdoor or C2 Backdoor or command and control channel related-to T1008 Fallback Channels
action.malware.variety.C2 Command and control (C2) related-to T1008 Fallback Channels
amazon_virtual_private_cloud Amazon Virtual Private Cloud technique_scores T1008 Fallback Channels
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict external network access to the minimum required and can therefore mitigate an adversary utilizing a fallback or alternative communication channels. In environments where unrestricted Internet access is required, security groups and NACLs can still be used to block known malicious endpoints. Because in such environments the protection is limited to known malicious IP addresses and domains and does not provide protection from such attacks from unknown domains and IP addresses, this is scored as partial coverage resulting in an overall Partial score.
References
aws_network_firewall AWS Network Firewall technique_scores T1008 Fallback Channels
Comments
AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to block communication with known fallback channels by filtering based on known bad IP addresses and domains. This mapping is given a score of Partial because it only protects against known fallback channels and not channels yet to be identified.
References